期刊文献+

基于社交网络中权威用户身份发现算法 被引量:2

Authoritative user discovery algorithm in social network
下载PDF
导出
摘要 通过用户粉丝数难以判断用户是否具备发布优质博文的能力,为此提出一种基于用户博文转发链接分析的算法。根据博文的转发数和转发者身份共同对优质博文进行定义,权威用户必然具备发布优质博文的能力,优质博文必然被众多用户转发。将改进的算法应用于新浪微博数据集上,实验结果表明,该算法具备较好的权威用户身份识别度。 The definition that whether a user is important is mainly based on his followers currently, however, it is difficult to evaluate whether a user is equipped with the ability to post high quality mbogs through the number of followers merely. A kind of link analysis algorithm based on user?s mblog reposting was proposed, the quality of the mblog was defined through its repos-ting number and reporting user, an authoritative user surely had the ability to post high level mblogs, high level mblogs surely were reposted by many of users. Experimental results on Sina Weibo datasets show that the improved algorithm outperforms existing algorithms and acquires better recognition ability of authority user.
作者 周丽杰 于伟海 郭成 ZHOU Li-jie YU Wei-hai GUO Cheng(Electronic Teaching Center, Yantai Vocational College, Yantai 264670, China Yantai Mandarin Training and Testing Center,Yantai 264003, China School of Software Technology,Dalian University of Technology, Dalian 116620, China)
出处 《计算机工程与设计》 北大核心 2017年第5期1157-1160,1341,共5页 Computer Engineering and Design
基金 国家自然科学基金项目(61401060 61272173) 山东省高等学校科技计划基金项目(J12LN73)
关键词 微博 权威用户 博文转发分析 粉丝关系 社交网络图 micro-blog authoritative user mblog repost analysis follow relationship social network graph
  • 相关文献

参考文献7

二级参考文献68

  • 1金鑫,谢斌,朱建明.基于复杂网络分析的微博网络舆情传播[J].吉林大学学报(工学版),2012,42(S1):271-275. 被引量:19
  • 2Hay M, Miklau G, Jensen D, et al. Anonymizing social networks [R]. 07-19. University of Massachusetts Amherst, 2007.
  • 3Liu K, Terzi E. Towards identity anonymization on graphs [C]// Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data (SIGMOD' 08). New York, NY, USA, ACM Press, 2008 : 93.
  • 4Liu Kun, Das K, Grandison T, et al. Privacy preserving data analysis on graphs and social networks[C]//Kargupta H, Han J, Yu P, et al. , eds. Nexteneration Data Mining. CRC Press, 2008.
  • 5Zheleva E,Getoor L. Preserving the privacy of sensitive relationships in graph data[C]//Proeeedings of the 1st ACM SIGKDD Workshop on Privacy, Security, and Trust in KDD(PinKDD' 07). 20071153-171.
  • 6Han Jia-wei, Kamber M, Data Ming. Concepts and Techniques(第二版)[M].范明,阵小峰,译.北京:机械:工业出版社,2007:255-259.
  • 7Zhou Bin, Pei J ian, Luk W-S. A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data[J]. ACM SIGKDD Explorations, ACM Press, 2008, 10 (2) : 12-22.
  • 8Zhou B, Pei J. Preserving Privacy in Social Networks against Neighborhood Attacks[C]//IEEE International Conference on Data Engineering(ICDE). 2008 : 506-515.
  • 9Byun J W, Kamra A, Bertino E, et al. Efficient k-Anonymization using Clustering Techniques [C] // International Conference on Database Systems for Advanced Applications(DASFAA). 2007:188-200.
  • 10Blake E K C, Merz C J. UCI repository of machine learning databases[EB/OL], http//www, ics. uci. edu/-mlearn/MLReposi- tory. html, 1998.

共引文献48

同被引文献12

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部