期刊文献+

基于半监督学习的社交网络用户属性预测 被引量:8

Predicting users' profiles in social network based on semi-supervised learning
下载PDF
导出
摘要 研究如何利用社交关系推测用户的隐藏属性(私隐信息),采用基于图的半监督学习方法推测用户属性。为了提高预测的准确率,提出利用属性聚集度评价属性推测的难易程度,并依用户节点标记的不同,设计不同的权重公式计算用户之间的关系强度。以"人人网"数据作为实验数据,对用户的兴趣与毕业学校进行预测,验证了方法的有效性。 How to derive the users' hidden profiles using social relationships is studied. Considering the network structure of social network and characteristics of users' data, the graph based semi-supervised learning algorithm is chose to predict users' profiles. To improve the prediction accuracy, the attribute affinity is proposed to evaluate whether the value of an attribute is easy to be predicated, and different weight computing formulas are designed to calculate the relationship between users. The experimental data is collected from "renren network" and two attributes, hobbies and schools, are predicted in the experiments. The experimental results show that the strategies for computing weights among users are effective.
出处 《通信学报》 EI CSCD 北大核心 2014年第8期15-22,共8页 Journal on Communications
基金 国家自然科学基金资助项目(61100192) 中国科学院计算所计算机体系结构国家重点实验室开放基金资助项目 哈尔滨工业大学科研创新基金资助项目(2010123) 哈尔滨工业大学深圳研究生院网络智能计算重点实验室基金资助项目~~
关键词 社交网络 属性推测 半监督学习 信息安全 social network inferring profiles semi-supervised learning information security
  • 相关文献

参考文献15

  • 1http://www.isc.org.crdzxzx/gzwm/listinfo-24778.html[EB/OL].
  • 2CHAPELLE O, SCHOLKO B. Semi-Supervised Learning[M]. MA: MIT Press. 2006.
  • 3ZHU X, LAFFERTY J, GHAHRAMANI Z. Semi-Supervised Learn- ing: From Gaussian Fields to Gaussian Processes[R]. CMU-CS-03-175, Carnegie Mellon University, 2003.
  • 4HE J, CHU W, LIU Z. Inferring privacy information from social net- works[J]. Lecture Notes in Computer Science, 2006, 3975:154-168.
  • 5XU W, ZHOU X. Inferring privacy information via social relations[A]. Proceeding of IEEE 24th International Conference on Data Engineer- ing workshop[C]. Cancun, Mexico, 2008.525-530.
  • 6LINDAMOOD J, HEATHERLY R, KANTARCIOGLU M, et al. Inferring private information using social network data[A]. Proceeding of International Conference on World Wide ~eb[C]. Madrid, Spain, 2009.123-130.
  • 7ZHELEVA E AND GETOOR L. To join or not to join: the illusion of privacy in social networks with mixed public and private user pro- files[A]. Proceeding of the 19th International Conference on World Wide Web[C]. Madrid, Spain, 2009.531-540.
  • 8MISLOVE A, VISWANATH B, GUMMADI K P. You are who you know: inferring user profiles in online social networks[A]. Proceeding of ACM International Conference on Web Search and Data Mining[C]. New York, USA, 2010.4-6.
  • 9霍峥,孟小峰,黄毅.PrivateCheckIn:一种移动社交网络中的轨迹隐私保护方法[J].计算机学报,2013,36(4):716-726. 被引量:69
  • 10李阳,王晓岩,王昆,沙瀛.基于社交网络的安全关系研究[J].计算机研究与发展,2012,49(S2):124-130. 被引量:10

二级参考文献35

  • 1唐常杰,刘威,温粉莲,乔少杰.社会网络分析和社团信息挖掘的三项探索——挖掘虚拟社团的结构、核心和通信行为[J].计算机应用,2006,26(9):2020-2023. 被引量:24
  • 2Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking//Pro-ceedings of the International Conference on Mobile Systems.Applications, and Services (MobiSys,03). San Fransisco,USA, 2003; 31-42.
  • 3Pan X, Xu J,Meng X. Protecting location privacy againstlocation-dependent attacks in mobile services. IEEE Transac-tions on Knowledge and Data Engineering, 2012, 24 (8):1506-1519.
  • 4Mokbel M F, Chow C Y,Aref W G. The newcasper:Queryprocessing for location services without compromising privacy//Proceedings of the 32nd Conference of Very Large Databases(VLDB 2006). Seoul, 2006:763-774.
  • 5Bamba B,Liu L. Supporting anonymous location queries inmobile environments with privacy grid//Proceedings of the17th International Conference on World Wide Web (WWW2008). Beijing, 2008; 237-246.
  • 6Krumm J. A survey of computational location privacy.Personal and Ubiquitous Computing, 2009,13(6):391-399.
  • 7Huo Z, Meng X, Hu H,Huang Y. You can walk alone:Trajectory privacy-preserving through significant stays pro-tection//Proceedings of the 17th International Conference onDatabase Systems for Advanced Applications (DASFAA,12).Busan, Korea,2012:351-366.
  • 8You T H, Peng W C,Lee W C. Protecting moving trajecto-ries with dummies//Proceedings of the 8th InternationalConference on Mobile Data Management (MDM,07). Mann-heim, Germany, 2007 ; 278-282.
  • 9Terrovitis M, Mamoulis N. Privacy preserving in the publi-cation of trajectories//Proceedings of the 9th InternationalConference on Mobile Data Management (MDM,08). Bei-jing, China, 2008:65-72.
  • 10Gruteser M, Liu X. Protecting privacy in continuous locationtracking applications. IEEE Security and Privacy, 2004,2(2):28-34.

共引文献75

同被引文献161

引证文献8

二级引证文献102

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部