期刊文献+

基于微博的事件传播分析 被引量:7

Event Propagation Analysis on Microblog
下载PDF
导出
摘要 事件的传播分析是社交网络分析中一个重要的研究点.网络热点事件的爆发通过社交网络迅速传播,从而在短时间内造成很大的影响.而在社交网络中制造舆论热点进行传播的代价相对于传统媒介较低,因此很容易被不法分子利用,对社会安全以及人们财产造成损失.传统的影响传播分析仅能对单条博文进行影响传播分析,这使社交网络中的事件传播分析受到限制.在已有的独立级联模型的基础上,提出了一种结合用户去重、垃圾用户滤除和概率阅读的传播模型,其基本思想是对多条热点博文构成的事件进行用户去重,构建事件传播网络拓扑图,然后对其中的垃圾用户节点进行滤除,最后利用概率阅读模型进行影响传播分析.这为事件传播分析提供了思路.通过一系列实验来验证方法及模型,通过与传统的博文分析进行对比,验证了方法的正确性与有效性. Event propagation analysis is one of the main research issues in the field of social network analysis. Hotspot outbreaks and spreads through the social network, and it makes a great impact in a short period of time. Meanwhile, it is easier to create a hotspot and spread it in social network than in traditional media, so information diffusion will do harm to social security and property if used by criminals. Traditional influence propagation analysis method can only analyze single microblog (or tweet), so it limits event propagation analysis in social network. In this paper, we review some existing propagation models such as independent cascade model, linear threshold model, etc. After that, we introduce some basic definitions of influence propagation analysis in social network. Then we propose a method combining user deduplication, spammer detection and probabilistic reading based on existing independent cascade model. The main idea of our method is making user deduplication in the event composed of several key microblogs (or tweets) and building event propagation graph. Then we remove spammers in that graph and make influence propagation analysis by using probabilistic reading model. It provides a novel method to make event propagation analysis. Finally, some experiments are conducted and the results demonstrate the correctness and effectiveness of the method.
出处 《计算机研究与发展》 EI CSCD 北大核心 2015年第2期437-444,共8页 Journal of Computer Research and Development
基金 国家科技支撑计划基金项目(2012BAH38B04) 国家"九七三"重点基础研究发展计划基金项目(2013CB329601) 中国博士后科学基金项目(2013M542560) 国家自然科学基金项目(61202362)
关键词 社交网络 传播模型 影响力分析 垃圾用户检测 概率阅读模型 social network propagation model influence analysis spammer detection probabilistic reading model
  • 相关文献

参考文献11

  • 1Goldenberg J, Libai B, Muller E. Talk of the network, A complex systems look at the underlying process of word-of?mouth[J]. Marketing Letters, 2001, 12(3), 211-223.
  • 2Goldenberg J, Libai B, Muller E. Using complex systems analysis to advance marketing theory development, Modeling heterogeneity effects on new product growth through stochastic cellular automata[J]. Academy of Marketing Science Review, 2001, 9(3), 1-18.
  • 3Granovetter M, Soong R. Threshold models of interpersonal effects in consumer demand[J]. Journal of Economic Behavior &. Organization, 1986, 7(D, 83-99.
  • 4Granovet ter M, Soong R. Threshold models of diffusion and collective behavior[Jl Journal of Mathematical Sociology, 1983,9(3), 165-179.
  • 5Kempe D, Kleinberg J, Tardos e. Maximizing the spread of influence through a social network[C]/ /Proc of the 10th ACM SIGKDD Int Conf On Knowledge Discovery and Data Mining. New York, ACM, 2003, 137-146.
  • 6Chen W, Wang Y, Yang S. Efficient influence maximization in social networks[C]//Proc of the 15th ACM SIGKDD Int Conf on Knowledge Discovery and Data Mining. New York: ACM, 2009: 199-208.
  • 7Even-Dar E, Shapira A. A Note on Maximizing the Spread of Influence in Social Networks[M] l/lnternet and Network Economics. Berlin: Springer. 2007: 281-286.
  • 8Ding Z Y. Zhang J F, Yan .I. et al. Detecting spamrners in microblogs[J]. Journal of Internet Technology. 2013, 14 (2): 289-296.
  • 9Islam M S. AI Mahmud A, Islam M R Machine Learning Approaches for Modeling Spammer Behavior[M] II Information Retrieval Technology. Berlin: Springer, 2010: 251-260.
  • 10Guzella T S. Caminhas W M. A review of machine learning approaches to spam filtering[J]. Expert Systems with Applications. 2009, 36(7): 10206-10222.

同被引文献42

引证文献7

二级引证文献77

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部