scispace - formally typeset
L

Lars Backstrom

Researcher at Facebook

Publications -  54
Citations -  14526

Lars Backstrom is an academic researcher from Facebook. The author has contributed to research in topics: Social network & Social graph. The author has an hindex of 31, co-authored 54 publications receiving 13806 citations. Previous affiliations of Lars Backstrom include Cornell University.

Papers
More filters
Proceedings ArticleDOI

Group formation in large social networks: membership, growth, and evolution

TL;DR: It is found that the propensity of individuals to join communities, and of communities to grow rapidly, depends in subtle ways on the underlying network structure, and decision-tree techniques are used to identify the most significant structural determinants of these properties.
Proceedings ArticleDOI

Meme-tracking and the dynamics of the news cycle

TL;DR: This work develops a framework for tracking short, distinctive phrases that travel relatively intact through on-line text; developing scalable algorithms for clustering textual variants of such phrases, and identifies a broad class of memes that exhibit wide spread and rich variation on a daily basis.
Posted Content

The Anatomy of the Facebook Social Graph

TL;DR: A strong effect of age on friendship preferences as well as a globally modular community structure driven by nationality are observed, but it is shown that while the Facebook graph as a whole is clearly sparse, the graph neighborhoods of users contain surprisingly dense structure.
Proceedings ArticleDOI

Supervised random walks: predicting and recommending links in social networks

TL;DR: In this article, a supervised random walk algorithm is proposed to predict the occurrence of links in Facebook social networks by combining the information from the network structure with node and edge level attributes to guide a random walk on the graph.
Proceedings ArticleDOI

Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography

TL;DR: A family of attacks is described such that even from a single anonymized copy of a social network, it is possible for an adversary to learn whether edges exist or not between specific targeted pairs of nodes.