• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Hu Kaixian, Liang Ying, Xu Hongbo, Bi Xiaodi, Zuo Yao. A Method for Social Network User Identity Feature Recognition[J]. Journal of Computer Research and Development, 2016, 53(11): 2630-2644. DOI: 10.7544/issn1000-1239.2016.20150219
Citation: Hu Kaixian, Liang Ying, Xu Hongbo, Bi Xiaodi, Zuo Yao. A Method for Social Network User Identity Feature Recognition[J]. Journal of Computer Research and Development, 2016, 53(11): 2630-2644. DOI: 10.7544/issn1000-1239.2016.20150219

A Method for Social Network User Identity Feature Recognition

More Information
  • Published Date: October 31, 2016
  • Social network is an important part of modern information society. The anonymity of social network users brings a series of problems concerning social security. This paper presents a method to recognize social network user identity feature by location-based social network (LBSN) and social relationships, and combine the results of those two to infer social network user true identity. The method of geo-location uses approximation weight which is calculated by computing full match weight and basic match weight based on Chinese segmentation and bi-word segmentation to evaluate the possibility that the entity is where the user studies or works, and the method uses entity name aggregation algorithm to optimize the result of approximation weight calculation. According to the observation that friend relationship between users on social network tends to indicate a certain same identity features or a share of common interests, the method of social relationships uses majority voting scheme to count users friends identity features to infer user address, entity information and interests. Based on microblog data, we conduct experiments on two samples which cover 1 000 users and 10 000 users respectively and involve a total of more than 2.5 million users relationships. Results shows that our method has a high rate of precision and recall. Compared with the existing methods, our method focuses on individual user identity feature and is valuable in practice.
  • Related Articles

    [1]Xue Xin, Zhu Tianchen, Sun Qingyun, Zhou Haoyi, Li Jianxin. Efficient Subgraph Matching Algorithm with Graph Neural Network[J]. Journal of Computer Research and Development, 2025, 62(3): 694-708. DOI: 10.7544/issn1000-1239.202330732
    [2]Shang Jing, Wu Zhihui, Xiao Zhiwen, Zhang Yifei. Graph4Cache: A Graph Neural Network Model for Cache Prefetching[J]. Journal of Computer Research and Development, 2024, 61(8): 1945-1956. DOI: 10.7544/issn1000-1239.202440190
    [3]Zhang Tianming, Xu Yiheng, Cai Xinwei, Fan Jing. A Shortest Path Query Method over Temporal Graphs[J]. Journal of Computer Research and Development, 2022, 59(2): 362-375. DOI: 10.7544/issn1000-1239.20210893
    [4]Guo Fangfang, Wang Xinyue, Wang Huiqiang, Lü Hongwu, Hu Yibing, Wu Fang, Feng Guangsheng, Zhao Qian. A Dynamic Stain Analysis Method on Maximal Frequent Sub Graph Mining[J]. Journal of Computer Research and Development, 2020, 57(3): 631-638. DOI: 10.7544/issn1000-1239.2020.20180846
    [6]Lu Jianhua, Zhang Baili, Jiang Shan, Lu Ningyun, Wang Feifei. Selection-Verification-Filtering: An Iterative Subgraph Containment Query Processing Strategy[J]. Journal of Computer Research and Development, 2012, 49(10): 2221-2228.
    [7]Ou Xiaoping, Wang Chaokun, Peng Zhuo, Qiu Ping, and Bai Yiyuan. A Graph-Based Music Data Model and Query Language[J]. Journal of Computer Research and Development, 2011, 48(10): 1879-1889.
    [8]Zhang Xu, He Xiangnan, Jin Cheqing, and Zhou Aoying. Processing k-Nearest Neighbors Query over Uncertain Graphs[J]. Journal of Computer Research and Development, 2011, 48(10): 1871-1878.
    [9]Zhang Lin, Zhang Li. Software Superfamilies Based on Sub-Graph Significance Profile[J]. Journal of Computer Research and Development, 2011, 48(2): 251-258.
    [10]Li Zhoujun, Chen Yiming, Liu Junwan, Chen Huowang. A Survey of Computational Method in Protein-Protein Interaction Research[J]. Journal of Computer Research and Development, 2008, 45(12): 2129-2137.

Catalog

    Article views (1581) PDF downloads (617) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return