Social network contains the interaction between social members, which constitutes the structure and attribute of social network. The interactive relationship of social network contains a lot of personal privacy inform...Social network contains the interaction between social members, which constitutes the structure and attribute of social network. The interactive relationship of social network contains a lot of personal privacy information. The direct release of social network data will cause the disclosure of privacy information. Aiming at the dynamic characteristics of social network data release, a new dynamic social network data publishing method based on differential privacy was proposed. This method was consistent with differential privacy. It is named DDPA (Dynamic Differential Privacy Algorithm). DDPA algorithm is an improvement of privacy protection algorithm in static social network data publishing. DDPA adds noise which follows Laplace to network edge weights. DDPA identifies the edge weight information that changes as the number of iterations increases, adding the privacy protection budget. Through experiments on real data sets, the results show that the DDPA algorithm satisfies the user’s privacy requirement in social network. DDPA reduces the execution time brought by iterations and reduces the information loss rate of graph structure.展开更多
With the increasing prevalence of social networks, more and more social network data are published for many applications, such as social network analysis and data mining. However, this brings privacy problems. For exa...With the increasing prevalence of social networks, more and more social network data are published for many applications, such as social network analysis and data mining. However, this brings privacy problems. For example, adversaries can get sensitive information of some individuals easily with little background knowledge. How to publish social network data for analysis purpose while preserving the privacy of individuals has raised many concerns. Many algorithms have been proposed to address this issue. In this paper, we discuss this privacy problem from two aspects: attack models and countermeasures. We analyse privacy conceres, model the background knowledge that adversary may utilize and review the recently developed attack models. We then survey the state-of-the-art privacy preserving methods in two categories: anonymization methods and differential privacy methods. We also provide research directions in this area.展开更多
Using social networking services is becoming more popular day by day. The websites of the social networks like face-book currently are among the most popular internet services just after giant portals such as Yahoo, M...Using social networking services is becoming more popular day by day. The websites of the social networks like face-book currently are among the most popular internet services just after giant portals such as Yahoo, MSN and search engines like Google. One of the main problems in analyzing these networks is the prediction of relationships between people in the network. The purpose of this paper is to forecast the friendship of a person with a new person using existing data on Flickr website accurately. In this paper, we achieved about 90% percent correct prediction with regards to the results which are obtained by using data mining methods.展开更多
This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data cons...This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data consumption of those platforms on the network. Network Mapper (Nmap Zenmap) Graphical User Interface 7.80 application was used to scan the various social media platforms to identify the protocols, ports, services, etc. to enable in accessing the vulnerability of the network. Data consumption of users’ mobile devices was collected and analyzed. Device Accounting (DA) based on the various social media applications was used. The results of the analysis revealed that the network is prone to attacks due to the nature of the protocols, ports, and services on social media applications. The numerous users with average monthly data consumption per user of 4 gigabytes, 300 megabytes on social media alone are a clear indication of high traffic as well as the cost of maintaining the network. A URL filtering of the social media websites was proposed on Rockus Outdoor AP to help curb the nuisance.展开更多
This paper is devoted to analyze and model user reading and replying activities in a bulletin board system (BBS) social network. By analyzing the data set from a famous Chinese BBS social network, we show how some u...This paper is devoted to analyze and model user reading and replying activities in a bulletin board system (BBS) social network. By analyzing the data set from a famous Chinese BBS social network, we show how some user activities distribute, and reveal several important features that might characterize user dynamics. We propose a method to model user activities in the BBS social network. The model could reproduce power-law and non-power-law distributions of user activities at the same time. Our results show that user reading and replying activities could be simulated through simple agent-based models. Specifically, manners of how the BBS server interacts with Internet users in the Web 2.0 application, how users organize their reading lists, and how user behavioral trait distributes are the important factors in the formation of activity patterns.展开更多
In 2008, the Brazilian Department of Science and Technology created the INCTs (Brazilian Science and Technology Institutes). One of them was the Cancer Control INCT. Due to its importance and considering that there ar...In 2008, the Brazilian Department of Science and Technology created the INCTs (Brazilian Science and Technology Institutes). One of them was the Cancer Control INCT. Due to its importance and considering that there are different groups working together in the same area, it is important that they collaborate intensely. Envisioning an empowerment of scientific collaboration, the BRINCA project was created to support a set of analyses of the social networks from this particular INCT. These analyses were created by mining curricular and publications bases, and identifying different types of scientific relationships and areas. We were able to observe, for instance, how the interaction is amongst researchers from related areas, which researchers were more collaborative and which ones were isolated from the network. These analyzes were used by the INCT coordination to understand and act to improve scientific collaboration.展开更多
Social media plays a crucial role in the organization of massive social movements. However, the sheer quantity of data generated by the events as well as the data collection restrictions that researchers encounter, le...Social media plays a crucial role in the organization of massive social movements. However, the sheer quantity of data generated by the events as well as the data collection restrictions that researchers encounter, leads to a series of challenges for researchers who want to analyze dynamic public discourse and opinion in response to and in the creation of world events. In this paper we present gatherTweet, a Python package that helps researchers efficiently collect social media data for events that are composed of many decentralized actions (across both space and time). The package is useful for studies that require analysis of the organizational or baseline messaging before an action, the action itself, and the effects of the action on subsequent public discourse. By capturing these aspects of world events gatherTweet enables the study of events and actions like protests, natural disasters, and elections.展开更多
The rising popularity of online social networks (OSNs), such as Twitter, Facebook, MySpace, and LinkedIn, in recent years has sparked great interest in sentiment analysis on their data. While many methods exist for id...The rising popularity of online social networks (OSNs), such as Twitter, Facebook, MySpace, and LinkedIn, in recent years has sparked great interest in sentiment analysis on their data. While many methods exist for identifying sentiment in OSNs such as communication pattern mining and classification based on emoticon and parts of speech, the majority of them utilize a suboptimal batch mode learning approach when analyzing a large amount of real time data. As an alternative we present a stream algorithm using Modified Balanced Winnow for sentiment analysis on OSNs. Tested on three real-world network datasets, the performance of our sentiment predictions is close to that of batch learning with the ability to detect important features dynamically for sentiment analysis in data streams. These top features reveal key words important to the analysis of sentiment.展开更多
The evolution of social media in the recent years promoted the appearance of a new category: social media based on check-in. It enables the user to define their identity through information sharing. This paper aims to...The evolution of social media in the recent years promoted the appearance of a new category: social media based on check-in. It enables the user to define their identity through information sharing. This paper aims to show the evolution of these media highlighting the effects and changes they cause in society through Super Bowl XLVI scenario, besides indicating the important role they have for the companies and marketing.展开更多
After reviewing the development of industrial manufacturing, a novel concept called social manufacturing(SM) and service are proposed as an innovative manufacturing solution for the coming personalized customization e...After reviewing the development of industrial manufacturing, a novel concept called social manufacturing(SM) and service are proposed as an innovative manufacturing solution for the coming personalized customization era. SM can realize a customer's requirements of "from mind to products", and fulfill tangible and intangible needs of a prosumer, i.e., producer and consumer at the same time. It represents a manufacturing trend,and is expected to become popular in more and more industries.First, a comparison between mass customization and SM is given out, and the basis and motivation from social network to SM is analyzed. Then, its basic theories and supporting technologies,like Internet of Things(Io T), social networks, cloud computing,3 D printing, and intelligent systems, are introduced and analyzed,and an SM platform prototype is developed. Finally, three transformation modes towards SM and 3 D printing are suggested for different user cases.展开更多
城市POI的分布情况客观反映了一个城市各行各业的发展情况,传统获取POI的测绘手段成本高、更新周期长、时效性差,而基于位置的社交网络(Location-Based Social Network,LBSN)平台的发展为实现城市POI的感知提供了一种新思路。本文提出...城市POI的分布情况客观反映了一个城市各行各业的发展情况,传统获取POI的测绘手段成本高、更新周期长、时效性差,而基于位置的社交网络(Location-Based Social Network,LBSN)平台的发展为实现城市POI的感知提供了一种新思路。本文提出一种基于LBSN数据聚类分析的城市POI感知方法,首先,对LBSN数据进行预处理,包括清洗重复数据、删除无效数据、数据预分类等,以提高数据的有效性;其次,提出一种改进的DBSCAN算法,对处理后的数据进行聚类分析,从而得到准确度较高的城市各类POI分布情况。实验结果表明,与传统的DBSCAN算法以及K-means算法相比,本文提出的算法有更好的聚类效果,且在聚类指标上有更大的CH指数值和更小的DBI指数值。展开更多
文摘Social network contains the interaction between social members, which constitutes the structure and attribute of social network. The interactive relationship of social network contains a lot of personal privacy information. The direct release of social network data will cause the disclosure of privacy information. Aiming at the dynamic characteristics of social network data release, a new dynamic social network data publishing method based on differential privacy was proposed. This method was consistent with differential privacy. It is named DDPA (Dynamic Differential Privacy Algorithm). DDPA algorithm is an improvement of privacy protection algorithm in static social network data publishing. DDPA adds noise which follows Laplace to network edge weights. DDPA identifies the edge weight information that changes as the number of iterations increases, adding the privacy protection budget. Through experiments on real data sets, the results show that the DDPA algorithm satisfies the user’s privacy requirement in social network. DDPA reduces the execution time brought by iterations and reduces the information loss rate of graph structure.
文摘With the increasing prevalence of social networks, more and more social network data are published for many applications, such as social network analysis and data mining. However, this brings privacy problems. For example, adversaries can get sensitive information of some individuals easily with little background knowledge. How to publish social network data for analysis purpose while preserving the privacy of individuals has raised many concerns. Many algorithms have been proposed to address this issue. In this paper, we discuss this privacy problem from two aspects: attack models and countermeasures. We analyse privacy conceres, model the background knowledge that adversary may utilize and review the recently developed attack models. We then survey the state-of-the-art privacy preserving methods in two categories: anonymization methods and differential privacy methods. We also provide research directions in this area.
文摘Using social networking services is becoming more popular day by day. The websites of the social networks like face-book currently are among the most popular internet services just after giant portals such as Yahoo, MSN and search engines like Google. One of the main problems in analyzing these networks is the prediction of relationships between people in the network. The purpose of this paper is to forecast the friendship of a person with a new person using existing data on Flickr website accurately. In this paper, we achieved about 90% percent correct prediction with regards to the results which are obtained by using data mining methods.
文摘This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data consumption of those platforms on the network. Network Mapper (Nmap Zenmap) Graphical User Interface 7.80 application was used to scan the various social media platforms to identify the protocols, ports, services, etc. to enable in accessing the vulnerability of the network. Data consumption of users’ mobile devices was collected and analyzed. Device Accounting (DA) based on the various social media applications was used. The results of the analysis revealed that the network is prone to attacks due to the nature of the protocols, ports, and services on social media applications. The numerous users with average monthly data consumption per user of 4 gigabytes, 300 megabytes on social media alone are a clear indication of high traffic as well as the cost of maintaining the network. A URL filtering of the social media websites was proposed on Rockus Outdoor AP to help curb the nuisance.
基金supported in part by the National Natural Science Foundation of China under Grant No. 60972010the Beijing Natural Science Foundation under Grant No. 4102047+1 种基金the Major Program for Research on Philosophy & Humanity Social Sciences of the Ministry of Education of China under Grant No. 08WL1101the Service Business of Scientists and Engineers Project under Grant No. 2009GJA00048
文摘This paper is devoted to analyze and model user reading and replying activities in a bulletin board system (BBS) social network. By analyzing the data set from a famous Chinese BBS social network, we show how some user activities distribute, and reveal several important features that might characterize user dynamics. We propose a method to model user activities in the BBS social network. The model could reproduce power-law and non-power-law distributions of user activities at the same time. Our results show that user reading and replying activities could be simulated through simple agent-based models. Specifically, manners of how the BBS server interacts with Internet users in the Web 2.0 application, how users organize their reading lists, and how user behavioral trait distributes are the important factors in the formation of activity patterns.
文摘In 2008, the Brazilian Department of Science and Technology created the INCTs (Brazilian Science and Technology Institutes). One of them was the Cancer Control INCT. Due to its importance and considering that there are different groups working together in the same area, it is important that they collaborate intensely. Envisioning an empowerment of scientific collaboration, the BRINCA project was created to support a set of analyses of the social networks from this particular INCT. These analyses were created by mining curricular and publications bases, and identifying different types of scientific relationships and areas. We were able to observe, for instance, how the interaction is amongst researchers from related areas, which researchers were more collaborative and which ones were isolated from the network. These analyzes were used by the INCT coordination to understand and act to improve scientific collaboration.
文摘Social media plays a crucial role in the organization of massive social movements. However, the sheer quantity of data generated by the events as well as the data collection restrictions that researchers encounter, leads to a series of challenges for researchers who want to analyze dynamic public discourse and opinion in response to and in the creation of world events. In this paper we present gatherTweet, a Python package that helps researchers efficiently collect social media data for events that are composed of many decentralized actions (across both space and time). The package is useful for studies that require analysis of the organizational or baseline messaging before an action, the action itself, and the effects of the action on subsequent public discourse. By capturing these aspects of world events gatherTweet enables the study of events and actions like protests, natural disasters, and elections.
文摘The rising popularity of online social networks (OSNs), such as Twitter, Facebook, MySpace, and LinkedIn, in recent years has sparked great interest in sentiment analysis on their data. While many methods exist for identifying sentiment in OSNs such as communication pattern mining and classification based on emoticon and parts of speech, the majority of them utilize a suboptimal batch mode learning approach when analyzing a large amount of real time data. As an alternative we present a stream algorithm using Modified Balanced Winnow for sentiment analysis on OSNs. Tested on three real-world network datasets, the performance of our sentiment predictions is close to that of batch learning with the ability to detect important features dynamically for sentiment analysis in data streams. These top features reveal key words important to the analysis of sentiment.
文摘The evolution of social media in the recent years promoted the appearance of a new category: social media based on check-in. It enables the user to define their identity through information sharing. This paper aims to show the evolution of these media highlighting the effects and changes they cause in society through Super Bowl XLVI scenario, besides indicating the important role they have for the companies and marketing.
基金supported in part by the National Natural Science Foundation of China(61233001,61773381,71232006,61304201,61533019,61773382)Finnish TEKES’s project“So Ma2020:Social Manufacturing”(2015-2017,211560)Chinese Guangdong’s S&T project(2015B010103001,2016B090910001)
文摘After reviewing the development of industrial manufacturing, a novel concept called social manufacturing(SM) and service are proposed as an innovative manufacturing solution for the coming personalized customization era. SM can realize a customer's requirements of "from mind to products", and fulfill tangible and intangible needs of a prosumer, i.e., producer and consumer at the same time. It represents a manufacturing trend,and is expected to become popular in more and more industries.First, a comparison between mass customization and SM is given out, and the basis and motivation from social network to SM is analyzed. Then, its basic theories and supporting technologies,like Internet of Things(Io T), social networks, cloud computing,3 D printing, and intelligent systems, are introduced and analyzed,and an SM platform prototype is developed. Finally, three transformation modes towards SM and 3 D printing are suggested for different user cases.
文摘城市POI的分布情况客观反映了一个城市各行各业的发展情况,传统获取POI的测绘手段成本高、更新周期长、时效性差,而基于位置的社交网络(Location-Based Social Network,LBSN)平台的发展为实现城市POI的感知提供了一种新思路。本文提出一种基于LBSN数据聚类分析的城市POI感知方法,首先,对LBSN数据进行预处理,包括清洗重复数据、删除无效数据、数据预分类等,以提高数据的有效性;其次,提出一种改进的DBSCAN算法,对处理后的数据进行聚类分析,从而得到准确度较高的城市各类POI分布情况。实验结果表明,与传统的DBSCAN算法以及K-means算法相比,本文提出的算法有更好的聚类效果,且在聚类指标上有更大的CH指数值和更小的DBI指数值。