期刊文献+

在线社交网络中信息传播模式的特征分析 被引量:14

Characteristic analysis of information propagation pattern in online social network
在线阅读 下载PDF
导出
摘要 在线社交网络以其独特的传播优势,已成为一种流行的社交媒体平台。针对在线社交网络中信息传播模式的形式特点,结合传染病动力学原理,提出了在线社交网络中的信息传播模型。模型考虑了不同用户行为对传播机理的影响,并建立了不同用户节点的演化方程组,模拟了信息传播的过程,分析了不同类型的用户在网络中的行为特征以及影响信息传播的主要因素。实验结果表明:不同类型的用户在信息传播过程中有着特定的行为规律,信息不会无限制地传播,并在最终达到平稳状态,并且传播系数和免疫系数越大,信息传播达到稳态的速度就越快。 Because of its unique advantage of information propagation, the online social network has been a popular social communication platform. In view of the characteristics of the form of information propagation and the dynamics theory of infectious diseases, this paper put forward the model of information propagation through online social network. The model considered the influence of different users' behaviors on the transmission mechanism, set up the evolution equations of different user nodes, simulated the process of information propagation, and analyzed the behavior characteristics of the different types of users and main factors that influenced the information propagation. The experimental resuhs show that different types of users have special behavior rules in the process of information propagation, i.e., information cannot be transported endlessly, and be reached at a stationary state, and the larger the spread coefficient or immune coefficient is, the faster it reached the stationary state.
出处 《计算机应用》 CSCD 北大核心 2013年第1期105-107,111,共4页 journal of Computer Applications
基金 教育部规划基金资助项目(11YJA860028) 福建省科技计划重大项目(2011H6006)
关键词 在线社交网络 信息传播 传播模式 特征分析 online social network information propagation transmission pattern characteristic analysis
  • 相关文献

参考文献13

  • 1Facebook[ EB/OL]. [ 2012-03-12]. http://www, facebook. com/.
  • 2MySpace[ EB/OL]. [ 2012-03-12]. http://www, myspace. com/.
  • 3人人网[EB/OL].[2012-03-25].http://www.renten.com/.
  • 4开心网[EB/OL].[2012-03-25].http://www.kaixin001.com/.
  • 5KUMAR R, NOVAK J, TOMKINS A. Structure and evolution of online social networks [ C]//Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York: ACM Press, 2006:611-617.
  • 6MISLOVE A, MARCON M, GUMMAD K P, et al. Measurement and analysis of online social networks [C]//IMC'07: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement. NewYork: ACM Press, 2007:29-42.
  • 7BENEVENUTO F, RODR1GUES T, CHA M, et al. Characterizing user behavior in online social networks [ C]// IMC'09: Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference. New York: ACM Press, 2009:49 -62.
  • 8CHEN W, WANG Y J, YANG S Y. Efficient influence maximiza- tion in social networks [ C]// KDD'09: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York: ACM Press, 2009:199 -208.
  • 9SHI X L, ZHU J, CAI R, et al. User grouping behavior in online forums [ C]//KDD'09: Proceedings of the 15th ACM SIGKDD In- ternational Conference on Knowledge Discovery and Data Mining. New York: ACM Press, 2009:777-786.
  • 10刘建伟,李为宇,孙钰.社交网络安全问题及其解决方案[J].中国科学技术大学学报,2011,41(7):565-575. 被引量:43

二级参考文献26

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Boyed D, Ellison N. Social network sites:Definition, history, and scholarship [J]. Journal of Computer- Mediated Communication, 2008, 13(1): 201-230.
  • 3Nagy J, Pecho P. Social network security [C]// Proceedings of the 3rd IEEE International Conference on Emerging Security Information, Systems and Technologies. Athens, Greece.. IEEE Computer Society, 2009: 321-325.
  • 4Douglis F. It's all about the (social) network[J]. IEEE Internet Computing, 2010, 14(1): 4-6.
  • 5Limsaiprom P, Tantatsanawong P. Social network anomaly and attack patterns analysis[C]//Proceedings of the 6th IEEE International Conference on Networked Computing. Heidelberg, Germany: IEEE Press, 2010: 11-13.
  • 6Hogben G. Security issues in the future of social networking[R/OL]. W3C Workshop on the Future of Social Networking, 2009 [2011-04-20]. http://www. w3. org/2008/09/msnws/papers/Future_of_ SN_ Giles_Hogben_ENISA. pdf.
  • 7Poppe R. Scalable face labeling in online social networks [C]// IEEE International Conference on Automatic Face & Gesture Recognition and Workshops. California, USA: IEEE Press, 2011: 566-571.
  • 8Jagatic T, Johnson N, Jakobsson M, et al. Social phishing[J]. Communications of the ACM, 2007, 50(3) : 94-100.
  • 9Douceur J R. The sybil attack[J]. Lecture Notes in Computer Science, 2002, 2 429: 251-260.
  • 10Ge M, Lam K, Wang X Q, et al. VisualSec.. A secure message delivery scheme for online social networks based on profile images [C]// Proceedings of GLOBECOM'09 : Global Telecommunications Conference. HI, USA: IEEE Press, 2009: 1-6.

共引文献194

同被引文献195

引证文献14

二级引证文献52

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部