Method for detecting suspected online water armies for microblog

A discovery method and microblogging technology, applied in other database retrieval, network data retrieval, instruments, etc., can solve problems such as inability to discover groups, achieve full utilization, strong modularity, and reduce complexity

Inactive Publication Date: 2017-07-11
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
View PDF1 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The purpose of the present invention is to solve the problem that group discovery cannot be accurately perfor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting suspected online water armies for microblog
  • Method for detecting suspected online water armies for microblog
  • Method for detecting suspected online water armies for microblog

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0030] The following describes the present invention in detail with reference to the drawings and embodiments:

[0031] Take a Sina Weibo user as an example:

[0032] The ID of this user is 5364402211. When it is necessary to determine whether this Weibo account is a navy account, only the user ID of user 5364402211 needs to be given. According to the method of the present invention, relevant data can be collected and analyzed according to the user ID, and finally whether this account is The navy gave the prediction result. The specific process is as figure 1 As shown, it will be explained in detail below.

[0033] Collect related microblog data according to Step 1:

[0034] Collect data on Sina Weibo that we want to study or directly obtain public data provided by Weibo. The data is collected by establishing a buffered URL queue, using the breadth first search algorithm (BFS) to search for web links, scanning and downloading the web pages of each node, and analyzing the pages to r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for detecting suspected online water armies for microblog, and belongs to the technical field of computer application. The method for detecting suspected online water armies for the microblog comprises the following six steps: correspondingly related microblog data collecting; data preprocessing; user characteristics extracting; training set building; water armies detection model training; and unlabeled data predicting and distinguishing. Compared with the prior art, the method for detecting suspected online water armies for the microblog has the advantages that the full utilization of the data is realized, the group discovery is conducted conveniently and quickly, a complicated classification detection model is not needed to be established, so that the complexity of an algorithm is reduced, the modularity of the algorithm is relatively high, the algorithm can be put into large-scale data for calculation, and the stability is relatively high; a single user can be conducted on online water armies detection, a group of users in a certain event can be identified, the modularity of the method is extremely high and the method can be stably applied to large-scale data calculation framework.

Description

technical field [0001] The method relates to a microblog-oriented method for discovering suspected trolls, and belongs to the technical field of social network analysis and data mining. Background technique [0002] In the past several years, social networking has become one of the main ways for people to keep in touch with relatives and friends on the Internet. Statistics show that people spend much more time on social networking sites than on other sites. Most social networking sites provide access services through mobile devices, which also makes social networking sites more frequent. [0003] The rapid popularity and widespread use of social networks allows these sites to collect a large amount of information about users, their friends, and their interests. Unfortunately, the convenient way of information dissemination and a large amount of valuable data have also attracted the attention of many illegal groups or individuals, and social networks are regarded by them as...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30G06Q50/00
CPCG06F16/951G06Q50/01
Inventor 刘春阳乔杨赵志云李雄张华平张旭庞琳王萌商建云王卿
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products