Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Microblog user trust evaluation method based on trust propagation

A trust propagation and user technology, applied in the field of social network analysis, can solve problems such as sensitive information leakage

Active Publication Date: 2019-06-21
HARBIN ENG UNIV
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the singleness of the user's sensitive label, the user's sensitive information is leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Microblog user trust evaluation method based on trust propagation
  • Microblog user trust evaluation method based on trust propagation
  • Microblog user trust evaluation method based on trust propagation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be further described below in conjunction with accompanying drawing:

[0035] as attached figure 1 As shown, for user u i and user u j relationship; as attached figure 2 As shown, it is the flow chart of the seed node selection method; as attached image 3 Shown is the flow chart of the pruning method; as attached Figure 4 Shown is the flow chart of the trust propagation method.

[0036] 1. In Weibo, users and their social relationships (such as followers and following relationships) and social activities (such as posting Weibo and hot topics) are the main entities. Some typical social activities in Weibo are summarized in Table 1.

[0037] Table 1 Five social activities in Weibo

[0038]

[0039]In order to distinguish malicious activities from legitimate activities, a very intuitive idea is to distinguish whether the social activities of these entities are malicious activities by measuring the trustworthiness of each entity. Thi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of social network analysis, and particularly relates to a microblog user trust evaluation method based on trust propagation. The method comprises: selecting seed nodes; executing a pruning method for the user social relation graph; setting an initial value in a deviation manner, and propgagting credible scores from two directions of credible propagation and uncredible propagation. In the aspect of seed node selection, nodes in a data set are clustered according to user characteristics to select two types of seed node sets, namely credible seeds and maliciousseeds with the most propagation value. In order to prevent the influence of the relation established between the user and the normal user on the algorithm from being damaged, the pruning method basedon the social activity and the similarity is designed, and the attack edge can be effectively clipped. And finally, trust propagation is simultaneously carried out from two types of seed nodes by utilizing the user social network diagram, the final user credibility is calculated through weighting, and malicious users with low credibility values are screened out. According to the invention, attacksof malicious users on the evaluation method can be effectively resisted.

Description

technical field [0001] The invention belongs to the field of social network analysis, and in particular relates to a microblog user trust evaluation method based on trust propagation. Background technique [0002] The vigorous development of the Internet has led to the emergence of various platforms, such as shopping platforms, review platforms, and social platforms. Online social network (Online Social Network) is becoming popular and becoming an indispensable part of people's life, and Weibo is just one of them. But because of its anonymity and openness, Weibo has become a flooded place, especially vulnerable to attacks by malicious users. Attackers can infinitely create a large number of false identities to damage the public opinion health of the system. Weibo allows users to communicate and collaborate as creators of main information. This unique feature, combined with its large user base, has made it a breeding ground for many cybercrimes. Therefore, cleaning up mal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q50/00G06K9/62
Inventor 王巍杨武玄世昌苘大鹏吕继光吴毓琳
Owner HARBIN ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products