A Fuzzy Detection Method for Collusion Attacks Oriented to Reputation Systems in Social Networks
A technology for social networking and collusion attacks, applied in the field of social networking, to solve problems such as neglect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0065] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments. This embodiment is carried out on the premise of the technical solution of the present invention, and detailed implementation and specific operation process are given, but the protection scope of the present invention is not limited to the following embodiments.
[0066] This application first defines a social network:
[0067] Definition 1
[0068] Social network: The social network is formalized as a bipartite graph, SG=, U={u 1 , u 2 ,...} represents the set of users in the social network, E={e 1 , e 2 ,...} is used to describe the collection of relationships between users.
[0069] user u i It is called a node in the social network model, and the subscript i represents the i-th user; if two different users u i and user u j There exists a line between u i reach u j The directed edge e(u i , u j ), then it indicates that there is ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


