Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Longitudinal federated learning-based social network cross-platform malicious user detection method

A malicious user and social network technology, applied in machine learning, platform integrity maintenance, data processing applications, etc., can solve the problem that data is difficult to meet the detection requirements, so as to improve the generalization ability and detection effect, and ensure security and accuracy sexual effect

Active Publication Date: 2021-06-29
HENAN UNIV OF SCI & TECH
View PDF8 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, the successful applications of the above solutions are all based on social big data. In actual application scenarios, malicious users have the characteristics of dispersion, latency, and complexity. It is difficult for unilateral data to meet the detection requirements. The data of two parties or even multiple parties are jointly trained to achieve satisfactory detection results; secondly, with the improvement of laws and regulations, it has become a worldwide recognized trend to pay attention to user privacy and data security, such as the "General Data Protection Regulation" promulgated by the European Union. "(General Data Protection Regulation, GDPR) stipulates that without the consent of the user, it has been expressly prohibited to collect user data from all parties in one place.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Longitudinal federated learning-based social network cross-platform malicious user detection method
  • Longitudinal federated learning-based social network cross-platform malicious user detection method
  • Longitudinal federated learning-based social network cross-platform malicious user detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0089]The present invention combines the multimedia social network CyVOD to expand and improve the existing federated learning framework, and builds a social network cross-platform malicious user detection framework based on vertical federated learning, such as Figure 6 As shown, the safe and compliant fusion of multi-party data for modeling analysis can achieve high-quality detection of malicious users and further maintain the ecological environment of social networks.

[0090] The whole architecture is divided into four parts, which are data preprocessing stage, sample alignment stage, federated learning stage, and data application stage.

[0091] Data preprocessing stage: In this stage, the instance objects select CyVOD’s Android mobile side (active side) and PC website side (passive side) as data providers, and build OSNs six-tuples (video, policy, guide, Notifications, posts, false information) metadata experiment platform, a total of 68 user click actions, a total of 50...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a social network cross-platform malicious user detection method based on longitudinal federated learning. The method comprises the following steps: step 1, constructing a social network cross-platform malicious user detection hierarchical architecture based on longitudinal federated learning; 2, dividing participants into active parties and passive parties, and performing preprocessing operation on sample data of the active parties and the passive parties in a data preprocessing layer to obtain structured data; step 3, mapping common sample data of the active party and the passive party by the structured data processed by the data preprocessing layer; 4, cooperatively training a global model under the definition of machine learning, and encrypting and decrypting data of an active party and a passive party by using homomorphic encryption to complete federal learning layer training; step 5, enabling the active party and the passive party to update own local model training parameters and output prediction results; and step 6, transmitting a prediction result obtained by the federal learning layer back to each participant in the data application layer, and realizing a high-quality malicious user detection effect.

Description

technical field [0001] The invention belongs to the technical field of the Internet, in particular to a detection method for cross-platform malicious users of a social network based on longitudinal federated learning. Background technique [0002] With the rapid development of Online Social Networks (OSNs), as of March 2020, the 45th "China Internet Development Statistical Report" shows that the number of OSNs users has reached 904 million, and the Internet penetration rate has reached 64.5%. Therefore, , while OSNs help people build social network application services, they have gradually become the primary target of malicious users trying to perform illegal activities and malicious harm. These malicious behaviors have caused adverse effects and huge harm to today's society. [0003] At present, traditional machine learning methods, such as semi-supervised clustering and support vector machine classifiers, rely on big data to extract and train malicious user behavior charac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/55G06F21/60G06F21/62G06Q50/00G06K9/62G06N20/00
CPCG06F21/554G06F21/602G06F21/6245G06Q50/01G06N20/00G06F18/24323G06F18/214
Inventor 张志勇宋斌梁腾翔张丽丽卫新乐牛丹梅李玉祥张孝国向菲张蓝方
Owner HENAN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products