• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Duan Songqing, Wu Bin, Wang Bai. TTRank: User Influence Rank Based on Tendency Transformation[J]. Journal of Computer Research and Development, 2014, 51(10): 2225-2238. DOI: 10.7544/issn1000-1239.2014.20131570
Citation: Duan Songqing, Wu Bin, Wang Bai. TTRank: User Influence Rank Based on Tendency Transformation[J]. Journal of Computer Research and Development, 2014, 51(10): 2225-2238. DOI: 10.7544/issn1000-1239.2014.20131570

TTRank: User Influence Rank Based on Tendency Transformation

More Information
  • Published Date: September 30, 2014
  • In recent years, many scholars have studied the problem of how to analyze user influence from the perspective of reply relationships. But there are various problems, such as reply relations are scarce, the content of posts are ignored, don’t support dynamic updates and so on. To compensate for these deficiencies, a user influence analysis method based on tendency transformation is proposed. Firstly, the post influence is calculated, the concept of “local reply chain” (LRC) is proposed, and the calculation method of reply indirect relationships is introduced, so the number of reply relationship is drastically increased. Secondly, the process of user tendency transformation is analyzed based on LRC, and the degrees of user impacting on others and being affected by others are gotten. Finally, the user influence ranking within the specified range is obtained. Compared with 10 kinds of classical influence analysis algorithms and used to analyze realistic data, the algorithm can characterize the user image better from the other point of view.
  • Related Articles

    [1]Chen Ruoxi, Chen Jinyin, Zheng Haibin, Yang Xueyan, Ji Shouling, Chen Tieming. Security of Deep Neural Network Supply Chains: A Survey[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440327
    [2]Liu Feng, Yang Jie, Li Zhibin, Qi Jiayin. A Secure Multi-Party Computation Protocol for Universal Data Privacy Protection Based on Blockchain[J]. Journal of Computer Research and Development, 2021, 58(2): 281-290. DOI: 10.7544/issn1000-1239.2021.20200751
    [3]Wei Lifei, Chen Congcong, Zhang Lei, Li Mengsi, Chen Yujiao, Wang Qin. Security Issues and Privacy Preserving in Machine Learning[J]. Journal of Computer Research and Development, 2020, 57(10): 2066-2085. DOI: 10.7544/issn1000-1239.2020.20200426
    [4]Chen Dongdong, Cao Zhenfu, Dong Xiaolei. Online/Offline Ciphertext-Policy Attribute-Based Searchable Encryption[J]. Journal of Computer Research and Development, 2016, 53(10): 2365-2375. DOI: 10.7544/issn1000-1239.2016.20160416
    [5]Lin Hui, Tian Youliang, Xu Li, Hu Jia. A Novel Privacy Aware Secure Routing Protocol for HWMN[J]. Journal of Computer Research and Development, 2015, 52(8): 1883-1892. DOI: 10.7544/issn1000-1239.2015.20140606
    [6]Ma Zhuo, Zhang Junwei, Ma Jianfeng, and Ji Wenjiang. Provably Secure Certificateless Trusted Access Protocol for WLAN Without Pairing[J]. Journal of Computer Research and Development, 2014, 51(2): 325-333.
    [7]Xin Wei, Sun Huiping, Chen Zhong. Analysis and Design of Distance-Bounding Protocols for RFID[J]. Journal of Computer Research and Development, 2013, 50(11): 2358-2366.
    [8]Wang Shaohui, Liu Sujuan, Chen Danwei. Scalable RFID Mutual Authentication Protocol with Backward Privacy[J]. Journal of Computer Research and Development, 2013, 50(6): 1276-1284.
    [9]Zhang Xiaoliang, Tu Yongce, Ma Hengtai, Yang Zhian, Hu Xiaohui. An End-to-End Authentication Protocol for Satellite Communication Network[J]. Journal of Computer Research and Development, 2013, 50(3): 540-547.
    [10]Ding Zhenhua, Li Jintao, Feng Bo. Research on Hash-Based RFID Security Authentication Protocol[J]. Journal of Computer Research and Development, 2009, 46(4): 583-592.

Catalog

    Article views (1121) PDF downloads (749) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return