Network navy identification method and device, storage medium and processor

An identification method and network technology, applied in the direction of network data indexing, network data retrieval, electronic digital data processing, etc., can solve problems such as unproposed solutions, network water army identification, etc.

Inactive Publication Date: 2019-11-15
沃民高新科技(北京)股份有限公司
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the technical problems in related technologies that are difficult to identify cyber trolls, no effective solutions have been proposed so far

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network navy identification method and device, storage medium and processor
  • Network navy identification method and device, storage medium and processor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0024] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0025] It should be noted that the terms "first" and "second...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network navy identification method and device, a storage medium and a processor. The network navy identification method comprises the following steps: capturing text data information related to a target keyword in a preset time period from the Internet; inputting the text data information into a network navy identification model, wherein the network navy identification model is trained by using multiple groups of historical text data through machine learning, and each group of historical text data in the multiple groups of historical text data comprises historical text data information and network navy characteristics identified in the historical text data information; and identifying whether network navy participates in the text data information from an output result of the network navy identification model. Through the network navy identification method and device, the technical problem that the network navy is difficult to identify in related technologies is solved.

Description

technical field [0001] The present application relates to the technical field of Internet information processing, and in particular, relates to a method and device, a storage medium, and a processor for identifying a network troll. Background technique [0002] With the advent of the Internet era, online trolls have emerged. The huge user base and potential business opportunities have led to the widespread manufacture and dissemination of false opinions and spam. The source of this type of harm is commonly known as cyber trolls. For example, behind many popular events, there are a large number of Internet trolls hidden. [0003] In a broad sense, cyber trolls refer to a group of accounts that are motivated by specific organizations or individuals to participate in online behaviors such as commenting, reposting, and liking specific online issues or events based on interests or value recognition. The network water army has the following characteristics: Four characteristics: ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/951G06N20/00G06F17/27
CPCG06F16/951G06N20/00
Inventor 齐中祥
Owner 沃民高新科技(北京)股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products