Malicious social user detection method based on adversarial learning

A detection method and user technology, applied in the field of malicious social user detection, can solve the problems of neural network error high-confidence prediction target, reduce the stability and reliability of malicious social user detection, and low robustness of neural network. The effect of semantic complexity, enhanced generalization ability, and increased representation ability

Active Publication Date: 2021-09-21
XIDIAN UNIV
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The neural network used in this method is an autoencoder model, and since it is susceptible to adversarial perturbations, even a small adversarial perturbation can cause the neural network to incorrectly predict the target with high confidence, resulting in low robustness of the neural network , thereby reducing the stability and reliability of malicious social user detection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious social user detection method based on adversarial learning
  • Malicious social user detection method based on adversarial learning
  • Malicious social user detection method based on adversarial learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The embodiments and effects of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0033] refer to figure 1 , the implementation of this example includes the following steps:

[0034] Step 1, collecting data and establishing different databases.

[0035] 1.1) Collect the social data in the social network platform, perform data cleaning, data transformation and data standard preprocessing on the collected social data in sequence, and obtain the preprocessed social data:

[0036]This example uses, but is not limited to, the zeroing method for data cleaning, the smooth aggregation method for data transformation, and the unified method for data standardization, that is, first set the invalid and missing values ​​of the collected social data to zero, and then use smooth aggregation Process and convert the set social data into a form suitable for social data mining, and then convert the converted social data into ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a malicious social user detection method based on adversarial learning. The malicious social user detection method mainly solves the problems that an existing malicious social user detection method is low in precision and poor in stability and reliability. According to the scheme, the method comprises the steps of 1) collecting data and establishing different databases; 2) constructing different feature maps according to the association between the user and the databases; 3) calculating different feature preferences according to the feature maps corresponding to the social data nodes of all published content of the user; 4) generating a training sample set and a test sample set; 5) constructing a neural network; 6) taking different feature preferences of the training samples as input, and training the neural network; and 7) inputting a test sample into the trained neural network to obtain a detection result. According to the method, the content feature preference, the attention feature preference and the propagation feature preference are comprehensively considered, the detection precision, stability and reliability are improved, and the method can be used for public opinion analysis, community discovery, false news detection and social network marketing.

Description

technical field [0001] The invention belongs to the technical field of network security, and further relates to a method for detecting malicious social users, which can be used for public opinion analysis, community discovery, false news detection, and social network marketing. Background technique [0002] Due to the openness of social networks and the abundance of user data information, there are a large number of malicious social users in social networks. Malicious social users perform various malicious activities and spread various malicious information, such as fake news, spreading advertisements, and phishing websites. Malicious social users interact with other normal social users by simulating the browsing traces of normal social users, such as false comments, sending malicious private messages, malicious mutual fans, malicious likes, malicious answers to questions, malicious addition of friends, in an attempt to interfere with public opinion and steal normal The per...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06N3/04G06N3/08
CPCH04L63/1408H04L63/1416H04L63/1425G06N3/08G06N3/045
Inventor 张琳杰朱笑岩马建峰
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products