A Method of Identifying Fraudulent Web Pages Using Fuzzy Theory
A fuzzy theory, web technology, applied in network data indexing, network data retrieval, electronic digital data processing, etc., can solve the problems of excessive reliance on the web page itself, short-lived and effective identification results, etc., and achieve the effect of simple and effective technical solutions
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0028] Step 1: After the user browses the webpage, according to the evaluation of the webpage, give his choice from the four pre-set tags (F, S, B, U) on the webpage, for example: 362F U means that the id is 362 The site has two users labeled F and U.
[0029] Step 2: In order to meet the requirements of the embodiment, we use the dataset webspam-uk2007 ("WebSpamCollections", http: / / chato.cl / webspam / datasets / , Crawled by the Laboratory of Web Algo rituals, University of Milan, http: / / chato.cl / webspam / datasets / / law.di.unimi.it / ) to verify the recognition rate of clustering experiments.
[0030] Step 3: Select 50 pieces of data with 2 users from the data set to generate a matrix M of 50*2.
[0031] Step 4: Calculate the fuzzy similarity matrix according to the formula to obtain a matrix R of 50*50.
[0032] The calculation formula includes:
[0033]
[0034] Wherein, i, j=1, 2, . . . , n. n is the number of rows of N;
[0035]
[0036] Wherein, i, j=1, 2, . . . , n. ...
Embodiment 2
[0051] Step 1: After the user browses the webpage, according to the evaluation of the webpage, give his choice from the four pre-set tags (F, S, B, U) on the webpage, for example: 362F U means that the id is 362 The site has two users labeled F and U.
[0052] Step 2: In order to meet the requirements of the embodiment, we use the dataset webspam-uk2007 ("WebSpamCollections", http: / / chato.cl / webspam / datasets / , Crawled by the Laboratory of Web Algorithmics, University of Milan, http: / / law.di.unimi.it / ) to verify the recognition rate of clustering experiments.
[0053] Step 3: Select 100 pieces of data with 2 users from the data set to generate a matrix M of 100*2.
[0054] Step 4: Calculate the fuzzy similarity matrix according to the formula to obtain a matrix R of 100*100.
[0055] The calculation formula includes:
[0056]
[0057] Wherein, i, j=1, 2, . . . , n. n is the number of rows of N;
[0058]
[0059] Wherein, i, j=1, 2, . . . , n. n is the number of row...
Embodiment 3
[0074] Step 1: After the user browses the webpage, according to the evaluation of the webpage, give his choice from the four pre-set tags (F, S, B, U) on the webpage, for example: 362F U means that the id is 362 The site has two users labeled F and U.
[0075] Step 2: In order to meet the requirements of the embodiment, we use the dataset webspam-uk2007 ("WebSpamCollections", http: / / chato.cl / webspam / datasets / , Crawled by the Laboratory of Web Algo rituals, University of Milan, http: / / chato.cl / webspam / datasets / / law.di.unimi.it / ) to verify the recognition rate of clustering experiments.
[0076] Step 3: Select 200 pieces of data with 2 users from the data set to generate a matrix M of 200*2.
[0077] Step 4: Calculate the fuzzy similarity matrix according to the formula to obtain a matrix R of 200*200.
[0078] The calculation formula includes:
[0079]
[0080] Wherein, i, j=1, 2, . . . , n. n is the number of rows of N;
[0081]
[0082] Wherein, i, j=1, 2, . . . ,...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


