Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for detecting suspected online water armies for microblog

A discovery method and microblogging technology, applied in other database retrieval, network data retrieval, instruments, etc., can solve problems such as inability to discover groups, achieve full utilization, strong modularity, and reduce complexity

Inactive Publication Date: 2017-07-11
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
View PDF1 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The purpose of the present invention is to solve the problem that group discovery cannot be accurately performed when user relationship link data is sparse, and to propose a microblog-oriented suspected troll discovery method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting suspected online water armies for microblog
  • Method for detecting suspected online water armies for microblog
  • Method for detecting suspected online water armies for microblog

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention is described in detail below in conjunction with accompanying drawing and embodiment:

[0031] Take a Sina Weibo user as an example:

[0032]The user ID is 5364402211. When it is necessary to judge whether this microblog account is a navy account, only the user ID of user 5364402211 needs to be given, and the method of the present invention can collect and analyze relevant data according to the user ID, and finally determine whether this account is a navy account. The navy gives the prediction result. Specific process such as figure 1 shown in detail below.

[0033] Collect relevant microblog data according to step 1:

[0034] Collect the Sina Weibo data we want to study or directly obtain the public data provided by Weibo. The data is collected by establishing a buffer URL queue, using the breadth-first search algorithm (BFS) to search for webpage links, scanning and downloading each node webpage, and parsing the page to remove irrelevant noi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for detecting suspected online water armies for microblog, and belongs to the technical field of computer application. The method for detecting suspected online water armies for the microblog comprises the following six steps: correspondingly related microblog data collecting; data preprocessing; user characteristics extracting; training set building; water armies detection model training; and unlabeled data predicting and distinguishing. Compared with the prior art, the method for detecting suspected online water armies for the microblog has the advantages that the full utilization of the data is realized, the group discovery is conducted conveniently and quickly, a complicated classification detection model is not needed to be established, so that the complexity of an algorithm is reduced, the modularity of the algorithm is relatively high, the algorithm can be put into large-scale data for calculation, and the stability is relatively high; a single user can be conducted on online water armies detection, a group of users in a certain event can be identified, the modularity of the method is extremely high and the method can be stably applied to large-scale data calculation framework.

Description

technical field [0001] The method relates to a microblog-oriented method for discovering suspected trolls, and belongs to the technical field of social network analysis and data mining. Background technique [0002] In the past several years, social networking has become one of the main ways for people to keep in touch with relatives and friends on the Internet. Statistics show that people spend much more time on social networking sites than on other sites. Most social networking sites provide access services through mobile devices, which also makes social networking sites more frequent. [0003] The rapid popularity and widespread use of social networks allows these sites to collect a large amount of information about users, their friends, and their interests. Unfortunately, the convenient way of information dissemination and a large amount of valuable data have also attracted the attention of many illegal groups or individuals, and social networks are regarded by them as...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F17/30G06Q50/00
CPCG06F16/951G06Q50/01
Inventor 刘春阳乔杨赵志云李雄张华平张旭庞琳王萌商建云王卿
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products