期刊文献+

在线社交网络下基于信任度的消息传播模型 被引量:6

Trust-based information propagation model in online social networks
下载PDF
导出
摘要 社交网络作为一种新兴的媒体具有广泛的社会影响力,且基于社交网络的营销方式逐渐成为一种新的发展趋势,因此研究社交网络中消息的传播具有重大的现实和经济意义。通过借鉴日常生活中人与人之间的信任原理,提出了一种基于信任度的消息传播模型。该模型首先利用个体的公开信息,使用数据挖掘的算法对个体进行分类;然后,根据同类和不同类个体之间的关系计算个体之间的信任度;最后,使用消息与个体的属性相似性以及信任度来计算消息可能传播范围。给出了相应的计算方法,并与两种基准方法对比,结果表明,该模型在准确度上提升15%左右,而所用时间降低50%以上。与数据集统计结果对比,该实验的结果与统计结果相差5%左右,充分表明该模型在实际应用中有比较好的效果。 As a new media, social network gains a wide range of social influence, and the social network based e- commerce becomes more and more popular, which make the study of information propagation of great significance. A trust based information propagation model was presented in this paper according to the trust relationship between people in daily life. First, the algorithm of data mining was employed on personal information to make the classification of the users. And then the value of trust between the users was calculated according to their relationships. At last, this paper predicted the range of information propagation by using the trust value between the users and messages. Compared with two basic methods, the final experiment shows that the results generated by the model are enhanced by 15% in precision, while the time used decreases more than 50%. The results differ with the statistic results on the dataset at 5%, which shows that the model preforms well in practice.
作者 张晓伟
出处 《计算机应用》 CSCD 北大核心 2014年第2期411-416,共6页 journal of Computer Applications
基金 广东省自然科学基金资助项目(9151009001000043)
关键词 社交网络 数据挖掘 分类算法 信任度 网络的结构聚类算法 消息传播模型 social network data mining classification algorithm trust Structural Clustering Algorithm for Networks (SCAN) information propagation model
  • 相关文献

参考文献8

二级参考文献146

共引文献307

同被引文献52

  • 1刘宴兵,刘飞飞.基于云计算的智能手机社交认证系统[J].通信学报,2012,33(S1):28-34. 被引量:7
  • 2韩卫国,王劲峰,刘旭华.SARS传播时间过程的参数反演和趋势预测[J].地球科学进展,2004,19(6):925-930. 被引量:13
  • 3冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:101
  • 4LUHMANN N.信任:一个社会复杂性的简化机制[M] .瞿铁鹏, 李强,译.上海:上海人民出版社,2005:73.
  • 5SALEM N B, HUBAUX J P. Securing wireless mesh networks[J]. IEEE Wireless Communications, 2006,13(2):50-55.
  • 6BLAZE M, FEIGENBAUM J, LACY J. Decentralized trust management[C]// Proceedings of the 17th Symposium on Security and Privacy. Washington, DC: IEEE Computer Society, 1996:164-173.
  • 7BETH T, BORCHERDING M, KLEIN B. Valuation of trust in open network[C]// Proceedings of the European Symposium on Research in Security. Brighton: Springer-Verlag, 1994:3-18.
  • 8JOSANG A, BRADLEY D, KNAPSKOG S J. Belief-based risk analysis[C]// Proceedings of the 2nd Workshop on Australasian Security,Data Mining and Web Intelligence,and Software Internationalisation. Darlinghurst: Australasian Computer Society, 2004:63-68.
  • 9SABATER J,SIERRA C. REGRET: reputation in gregarious societies[C]// Proceedings of the 15th International Conference on Autonomous Agents.New York: ACM,2001:194-195.
  • 10AL-OUFI S,KIM H-N, SADDIK A E. A group trust metric for identifying people of trust in online social networks[J]. Expert Systems with Applications,2012,39(18): 13173-13181.

引证文献6

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部