期刊文献+
共找到16,277篇文章
< 1 2 250 >
每页显示 20 50 100
Possible Classifications of Social Network Addiction:A Latent Profile Analysis of Chinese College Students 被引量:1
1
作者 Lin Luo Junfeng Yuan +4 位作者 Yanling Wang Rui Zhu HuilinXu Siyuan Bi Zhongge Zhang 《International Journal of Mental Health Promotion》 2025年第6期863-876,共14页
Objectives:SocialNetworkAddiction(SNA)is becoming increasingly prevalent among college students;however,there remains a lack of consensus regarding the measurement tools and their optimal cutoff score.This study aims ... Objectives:SocialNetworkAddiction(SNA)is becoming increasingly prevalent among college students;however,there remains a lack of consensus regarding the measurement tools and their optimal cutoff score.This study aims to validate the 21-item SocialNetwork Addiction Scale-Chinese(SNAS-C)in its Chinese version and to determine its optimal cutoff score for identifying potential SNA cases within the college student population.Methods:A crosssectional survey was conducted,recruiting 3387 college students.Latent profile analysis(LPA)and receiver operating characteristic(ROC)curve analysis were employed to establish the optimal cutoff score for the validated 21-item SNAS-C.Results:Three profile models were selected based on multiple statistical criteria,classifying participants into low-risk,moderate-risk,and high-risk groups.The highest-risk group was defined as“positive”for SNA,while the remaining groups were considered“negative”,serving as the reference standard for ROC analysis.The optimal cutoff score was determined to be 72(sensitivity:98.2%,specificity:96.86%),with an overall classification accuracy of 97.0%.The“positive”group reported significantly higher frequency of social network usage,greater digitalmedia dependence scores,and a higher incidence of network addiction.Conclusion:This study identified the optimal cutoff score for the SNAS-C as≥72,demonstrating high sensitivity,specificity,and diagnostic accuracy.This threshold effectively distinguishes between high-risk and low-risk SNA. 展开更多
关键词 social network addiction mental health latent profile analysis(LPA) receiver operating characteristic(ROC) social networking addiction scale-Chinese(SNAS-C)
暂未订购
Optimization of Park System in Haidian District,Beijing Based on Social Network Analysis
2
作者 WU Haotian CAO Ying 《Journal of Landscape Research》 2025年第2期11-16,共6页
The construction of“park cities”requires a systematic thinking to coordinate the networked development of park system and break through the limitation of emphasizing scale and grade and neglecting dynamic correlatio... The construction of“park cities”requires a systematic thinking to coordinate the networked development of park system and break through the limitation of emphasizing scale and grade and neglecting dynamic correlation in traditional planning.Taking Haidian District of Beijing as an example,the social network analysis method is introduced to construct the network model of park green spaces.Through indicators such as clustering coefficient,network density and node centrality,the characteristics of its spatial structure and hierarchical relationship are analyzed.It is found that the network integrity presents the characteristics of“highly local concentration and global fragmentation”,fragmented park green space network and missing spatial connection,isolated clusters and collaborative failure,as well as the spatial mismatch between population and resource supply and demand.Hierarchical issues include“structural imbalance and functional disorder”,disorder between network hierarchy and park level,misalignment of functional hierarchy leading to weakened network risk resistance capacity,and a relatively dense distribution of core nodes,etc.In response to the above problems,a multi-level spatial intervention strategy should be adopted to solve the overall problem of the network.Meanwhile,it is needed to clarify the positioning of a park itself and improve the hierarchical system,so as to construct a multi-level and multi-scale park green space network,contribute to the construction of a park city,and provide residents with more diverse activity venues. 展开更多
关键词 Urban park system social network analysis Haidian District BEIJING Park network structure
在线阅读 下载PDF
Deep Learning-Based Natural Language Processing Model and Optical Character Recognition for Detection of Online Grooming on Social Networking Services
3
作者 Sangmin Kim Byeongcheon Lee +2 位作者 Muazzam Maqsood Jihoon Moon Seungmin Rho 《Computer Modeling in Engineering & Sciences》 2025年第5期2079-2108,共30页
The increased accessibility of social networking services(SNSs)has facilitated communication and information sharing among users.However,it has also heightened concerns about digital safety,particularly for children a... The increased accessibility of social networking services(SNSs)has facilitated communication and information sharing among users.However,it has also heightened concerns about digital safety,particularly for children and adolescents who are increasingly exposed to online grooming crimes.Early and accurate identification of grooming conversations is crucial in preventing long-term harm to victims.However,research on grooming detection in South Korea remains limited,as existing models trained primarily on English text and fail to reflect the unique linguistic features of SNS conversations,leading to inaccurate classifications.To address these issues,this study proposes a novel framework that integrates optical character recognition(OCR)technology with KcELECTRA,a deep learning-based natural language processing(NLP)model that shows excellent performance in processing the colloquial Korean language.In the proposed framework,the KcELECTRA model is fine-tuned by an extensive dataset,including Korean social media conversations,Korean ethical verification data from AI-Hub,and Korean hate speech data from Hug-gingFace,to enable more accurate classification of text extracted from social media conversation images.Experimental results show that the proposed framework achieves an accuracy of 0.953,outperforming existing transformer-based models.Furthermore,OCR technology shows high accuracy in extracting text from images,demonstrating that the proposed framework is effective for online grooming detection.The proposed framework is expected to contribute to the more accurate detection of grooming text and the prevention of grooming-related crimes. 展开更多
关键词 Online grooming KcELECTRA natural language processing optical character recognition social networking service text classification
在线阅读 下载PDF
Model and service for privacy in decentralized online social networks
4
作者 George Pacheco Pinto JoséRonaldo Leles Jr +3 位作者 Cíntia da Costa Souza Paulo Rde Souza Frederico Araújo Durão Cássio Prazeres 《Journal of Electronic Science and Technology》 2025年第1期76-97,共22页
Intensely using online social networks(OSNs)makes users concerned about privacy of data.Given the centralized nature of these platforms,and since each platform has a particular storage mechanism,authentication,and acc... Intensely using online social networks(OSNs)makes users concerned about privacy of data.Given the centralized nature of these platforms,and since each platform has a particular storage mechanism,authentication,and access control,their users do not have the control and the right over their data.Therefore,users cannot easily switch between similar platforms or transfer data from one platform to another.These issues imply,among other things,a threat to privacy since such users depend on the interests of the service provider responsible for administering OSNs.As a strategy for the decentralization of the OSNs and,consequently,as a solution to the privacy problems in these environments,the so-called decentralized online social networks(DOSNs)have emerged.Unlike OSNs,DOSNs are decentralized content management platforms because they do not use centralized service providers.Although DOSNs address some of the privacy issues encountered in OSNs,DOSNs also pose significant challenges to consider,for example,access control to user profile information with high granularity.This work proposes developing an ontological model and a service to support privacy in DOSNs.The model describes the main concepts of privacy access control in DOSNs and their relationships.In addition,the service will consume the model to apply access control according to the policies represented in the model.Our model was evaluated in two phases to verify its compliance with the proposed domain.Finally,we evaluated our service with a performance evaluation,and the results were satisfactory concerning the response time of access control requests. 展开更多
关键词 Access control Decentralized online social network ONTOLOGY PRIVACY
在线阅读 下载PDF
Unveiling the role of social networks: Enhancing rural household livelihood resilience in China's Dabie Mountains
5
作者 TANG Lanyun LIU Chongchong WANG Ying 《Journal of Geographical Sciences》 2025年第2期335-358,共24页
Social networks are vital for building the livelihood resilience of rural households.However,the impact of social networks on rural household livelihood resilience remains em-pirically underexplored,and most existing ... Social networks are vital for building the livelihood resilience of rural households.However,the impact of social networks on rural household livelihood resilience remains em-pirically underexplored,and most existing studies do not disaggregate social networks into different dimensions,which limits the understanding of specific mechanisms.Based on 895 household samples collected in China's Dabie Mountains and structural equation modeling,this paper explored the pathway to enhance livelihood resilience through social networks by dis-aggregating it into five dimensions:network size,interaction intensity,social cohesion,social support,and social learning.The results indicate that:(1)Livelihood assets,adaptive capacity and safety nets significantly contribute to livelihood resilience,whereas sensitivity negatively affects it.Accessibility to basic services has no significant relationship with livelihood resilience in the study area.(2)Social networks and their five dimensions positively impact livelihood re-silience,with network support having the greatest impact.Therefore,both the government and rural households should recognize and enhance the role of social networks in improving liveli-hood resilience under frequent disturbances.These findings have valuable implications for mitigating the risks of poverty recurrence and contributing to rural revitalization. 展开更多
关键词 livelihood resilience social network rural revitalization structural equation modeling Dabie Mountains China
原文传递
A Dynamic Social Network Graph Anonymity Scheme with Community Structure Protection
6
作者 Yuanjing Hao Xuemin Wang +2 位作者 Liang Chang Long Li Mingmeng Zhang 《Computers, Materials & Continua》 2025年第2期3131-3159,共29页
Dynamic publishing of social network graphs offers insights into user behavior but brings privacy risks, notably re-identification attacks on evolving data snapshots. Existing methods based on -anonymity can mitigate ... Dynamic publishing of social network graphs offers insights into user behavior but brings privacy risks, notably re-identification attacks on evolving data snapshots. Existing methods based on -anonymity can mitigate these attacks but are cumbersome, neglect dynamic protection of community structure, and lack precise utility measures. To address these challenges, we present a dynamic social network graph anonymity scheme with community structure protection (DSNGA-CSP), which achieves the dynamic anonymization process by incorporating community detection. First, DSNGA-CSP categorizes communities of the original graph into three types at each timestamp, and only partitions community subgraphs for a specific category at each updated timestamp. Then, DSNGA-CSP achieves intra-community and inter-community anonymization separately to retain more of the community structure of the original graph at each timestamp. It anonymizes community subgraphs by the proposed novel -composition method and anonymizes inter-community edges by edge isomorphism. Finally, a novel information loss metric is introduced in DSNGA-CSP to precisely capture the utility of the anonymized graph through original information preservation and anonymous information changes. Extensive experiments conducted on five real-world datasets demonstrate that DSNGA-CSP consistently outperforms existing methods, providing a more effective balance between privacy and utility. Specifically, DSNGA-CSP shows an average utility improvement of approximately 30% compared to TAKG and CTKGA for three dynamic graph datasets, according to the proposed information loss metric IL. 展开更多
关键词 Dynamic social network graph k-composition anonymity community structure protection graph publishing security and privacy
在线阅读 下载PDF
Drivers influencing the adoption of cryptocurrency: a social network analysis approach
7
作者 K.Kajol Srijanani Devarakonda +1 位作者 Ranjit Singh H.Kent Baker 《Financial Innovation》 2025年第1期2103-2127,共25页
Cryptocurrency has gained popularity as a potential new global payment method.It has the potential to be faster,cheaper,and more secure than existing payment networks,making it a game-changer in the global economy.How... Cryptocurrency has gained popularity as a potential new global payment method.It has the potential to be faster,cheaper,and more secure than existing payment networks,making it a game-changer in the global economy.However,more research is needed to identify the factors driving cryptocurrency adoption and understand its impact.We use social network analysis(SNA)to identify the influencing factors and reveal the impact of each on cryptocurrency adoption.Our analysis initially revealed 44 influential factors,which were later reduced to 25 factors,each exerting a different influence.Based on the SNA,we classify these factors into highly,moderately,and least influential categories.Discomfort and optimism are the most influential determinants of adoption.Moderately influential factors include trust,risk,relative advantage,social influence,and perceived behavioral control.Price/value,facilitating conditions,compatibility,and usefulness are the least influential.The factors affecting cryptocurrency adoption are interdependent.Our findings can help policymakers understand the factors influencing cryptocurrency adoption and aid in developing appropriate legal frameworks for cryptocurrency use. 展开更多
关键词 Cryptocurrency social network analysis(SNA) Systematic review Delphi technique
在线阅读 下载PDF
Using X Social Networks and web news mining to predict Marburg virus disease outbreaks
8
作者 Mohammad Jokar Kia Jahanbin Vahid Rahmanian 《Asian Pacific Journal of Tropical Medicine》 2025年第2期96-98,共3页
Marburg virus disease(MVD)is a highly fatal illness,with a case fatality rate of up to 88%,though this rate can be significantly reduced with prompt and effective patient care.The disease was first identified in 1967 ... Marburg virus disease(MVD)is a highly fatal illness,with a case fatality rate of up to 88%,though this rate can be significantly reduced with prompt and effective patient care.The disease was first identified in 1967 during concurrent outbreaks in Marburg and Frankfurt,Germany,and in Belgrade,Serbia,linked to laboratory use of African green monkeys imported from Uganda.Subsequent outbreaks and isolated cases have been reported in various African countries,including Angola,the Democratic Republic of the Congo,Equatorial Guinea,Ghana,Guinea,Kenya,Rwanda,South Africa(in an individual with recent travel to Zimbabwe),Tanzania,and Uganda.Initial human MVD infections typically occur due to prolonged exposure to mines or caves inhabited by Rousettus aegyptiacus fruit bats,the natural hosts of the virus. 展开更多
关键词 laboratory use marburg virus disease mvd african green monkeys outbreaks social networks marburg virus disease case fatality rate web news mining
暂未订购
Effect of Technology Support for Social Network on Agricultural Technology Diffusion 被引量:1
9
作者 旷浩源 应若平 《Agricultural Science & Technology》 CAS 2012年第1期98-102,共5页
[Objective] To analyze the key factor in agricultural technology diffusion- technology support, and to explore the method to quicken the diffusion of agricultural technology. [Method] The technology acquisition advant... [Objective] To analyze the key factor in agricultural technology diffusion- technology support, and to explore the method to quicken the diffusion of agricultural technology. [Method] The technology acquisition advantage of social network was il- lustrated by summarizing the status and characteristics of agricultural technology and technology supporting types in the process of agriculture technology diffusion. [Result] The multi-layer, complex, persistence, systematization features of agricultural technol- ogy require support and help of technology from surrounding social network to ulti- mately internalize the technology. [Conclusion] Using social networks for the technol- ogy support will be a powerful supplement to the system of agricultural technology diffusion. 展开更多
关键词 Agricultural technology diffusion social network Technology support
在线阅读 下载PDF
Knockouts of high-ranking males have limited impact on baboon social networks 被引量:3
10
作者 Mathias FRANZ Jeanne ALTMANN Susan C. ALBERTS 《Current Zoology》 SCIE CAS CSCD 2015年第1期107-113,共7页
Social network structures can crucially impact complex social processes such as collective behaviour or the transmission of information and diseases. However, currently it is poorly understood how social networks chan... Social network structures can crucially impact complex social processes such as collective behaviour or the transmission of information and diseases. However, currently it is poorly understood how social networks change over time. Previous studies on primates suggest that 'knockouts' (due to death or dispersal) of high-ranking individuals might be important drivers for structural changes in animal social networks. Here we test this hypothesis using long-term data on a natural population of ba- boons, examining the effects of 29 natural knockouts of alpha or beta males on adult female social networks. We investigated whether and how knockouts affected (i) changes in grooming and association rates among adult females, and (2) changes in mean degree and global clustering coefficient in these networks. The only significant effect that we found was a decrease in mean degree in grooming networks in the first month after knockouts, but this decrease was rather small, and grooming networks re- bounded to baseline levels by the second month after knockouts. Taken together our results indicate that the removal of high-ranking males has only limited or no lasting effects on social networks of adult female baboons. This finding calls into question the hypothesis that the removal of high-ranking individuals has a destabilizing effect on social network structures in social animals [Current Zoology 61 (1): 107-113, 2015]. 展开更多
关键词 social network analysis social network dynamics KNOCKOUTS BABOONS
原文传递
Model for Generating Scale-Free Artificial Social Networks Using Small-World Networks
11
作者 Farhan Amin Gyu Sang Choi 《Computers, Materials & Continua》 SCIE EI 2022年第12期6367-6391,共25页
The Internet of Things(IoT)has the potential to be applied to social networks due to innovative characteristics and sophisticated solutions that challenge traditional uses.Social network analysis(SNA)is a good example... The Internet of Things(IoT)has the potential to be applied to social networks due to innovative characteristics and sophisticated solutions that challenge traditional uses.Social network analysis(SNA)is a good example that has recently gained a lot of scientific attention.It has its roots in social and economic research,as well as the evaluation of network science,such as graph theory.Scientists in this area have subverted predefined theories,offering revolutionary ones regarding interconnected networks,and they have highlighted the mystery of six degrees of separation with confirmation of the small-world phenomenon.The motivation of this study is to understand and capture the clustering properties of large networks and social networks.We present a network growth model in this paper and build a scale-free artificial social network with controllable clustering coefficients.The random walk technique is paired with a triangle generating scheme in our proposed model.As a result,the clustering controlmechanism and preferential attachment(PA)have been realized.This research builds on the present random walk model.We took numerous measurements for validation,including degree behavior and the measure of clustering decay in terms of node degree,among other things.Finally,we conclude that our suggested random walk model is more efficient and accurate than previous state-of-the-art methods,and hence it could be a viable alternative for societal evolution. 展开更多
关键词 social networks small-world networks network generation models graph theory random walk network design social network analysis
在线阅读 下载PDF
Study on Information Diffusion Analysis in Social Networks and Its Applications 被引量:8
12
作者 Biao Chang Tong Xu +1 位作者 Qi Liu En-Hong Chen 《International Journal of Automation and computing》 EI CSCD 2018年第4期377-401,共25页
Due to the prevalence of social network services, more and more attentions are paid to explore how information diffuses and users affect each other in these networks, which has a wide range of applications, such as vi... Due to the prevalence of social network services, more and more attentions are paid to explore how information diffuses and users affect each other in these networks, which has a wide range of applications, such as viral marketing, reposting prediction and social recommendation. Therefore, in this paper, we review the recent advances on information diffusion analysis in social networks and its applications. Specifically, we first shed light on several popular models to describe the information diffusion process in social networks, which enables three practical applications, i.e., influence evaluation, influence maximization and information source detection. Then, we discuss how to evaluate the authority and influence based on network structures. After that, current solutions to influence maximiza- tion and information source detection are discussed in detail, respectively. Finally, some possible research directions of information diffu- sion analysis are listed for further study. 展开更多
关键词 Information diffusion influence evaluation influence maximization information source detection social network.
原文传递
Social Network Information Propagation Model Based on Individual Behavior 被引量:9
13
作者 Lejun Zhang Hongjie Li +1 位作者 Chunhui Zhao Xiaoying Lei 《China Communications》 SCIE CSCD 2017年第7期78-92,共15页
In this paper, we discuss building an information dissemination model based on individual behavior. We analyze the individual behavior related to information dissemination and the factors that affect the sharing behav... In this paper, we discuss building an information dissemination model based on individual behavior. We analyze the individual behavior related to information dissemination and the factors that affect the sharing behavior of individuals, and we define and quantify these factors. We consider these factors as characteristic attributes and use a Bayesian classifier to classify individuals. Considering the forwarding delay characteristics of information dissemination, we present a random time generation method that simulates the delay of information dissemination. Given time and other constraints, a user might not look at all the information that his/her friends published. Therefore, this paper proposes an algorithm to predict information visibility, i.e., it estimates the probability that an individual will see the information. Based on the classification of individual behavior and combined with our random time generation and information visibility prediction method, we propose an information dissemination model based on individual behavior. The model can be used to predict the scale and speed of information propagation. We use data sets from Sina Weibo to validate and analyze the prediction methods of the individual behavior and information dissemination model based on individual behavior. A previously proposedinformation dissemination model provides the foundation for a subsequent study on the evolution of the network and social network analysis. Predicting the scale and speed of information dissemination can also be used for public opinion monitoring. 展开更多
关键词 social network information propagation individual behavior propagation delay
在线阅读 下载PDF
SEIR Model of Rumor Spreading in Online Social Network with Varying Total Population Size 被引量:7
14
作者 董苏雅拉图 邓燕斌 黄永畅 《Communications in Theoretical Physics》 SCIE CAS CSCD 2017年第10期545-552,共8页
Based on the infectious disease model with disease latency, this paper proposes a new model for the rumor spreading process in online social network. In this paper what we establish an SEIR rumor spreading model to de... Based on the infectious disease model with disease latency, this paper proposes a new model for the rumor spreading process in online social network. In this paper what we establish an SEIR rumor spreading model to describe the online social network with varying total number of users and user deactivation rate. We calculate the exact equilibrium points and reproduction number for this model. Furthermore, we perform the rumor spreading process in the online social network with increasing population size based on the original real world Facebook network. The simulation results indicate that the SEIR model of rumor spreading in online social network with changing total number of users can accurately reveal the inherent characteristics of rumor spreading process in online social network. 展开更多
关键词 online social network rumor spreading model equilibrium point varying population size
原文传递
Trust-Based Context-Aware Mobile Social Network Service Recommendation 被引量:4
15
作者 XU Jun ZHONG Yuansheng +1 位作者 ZHU Wenqiang SUN Feifei 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第2期149-156,共8页
The service recommendation mechanism as a key enabling technology that provides users with more proactive and personalized service is one of the important research topics in mobile social network (MSN). Meanwhile, M... The service recommendation mechanism as a key enabling technology that provides users with more proactive and personalized service is one of the important research topics in mobile social network (MSN). Meanwhile, MSN is susceptible to various types of anonymous information or hacker actions. Trust can reduce the risk of interaction with unknown entities and prevent malicious attacks. In our paper, we present a trust-based service recommendation algorithm in MSN that considers users' similarity and friends' familiarity when computing trustworthy neighbors of target users. Firstly, we use the context information and the number of co-rated items to define users' similarity. Then, motivated by the theory of six degrees of space, the friend familiarity is derived by graph-based method. Thus the proposed methods are further enhanced by considering users' context in the recommendation phase. Finally, a set of simulations are conducted to evaluate the accuracy of the algorithm. The results show that the friend familiarity and user similarity can effectively improve the recommendation performance, and the friend familiarity contributes more than the user similarity. 展开更多
关键词 TRUST CONTEXT-AWARE mobile social network RECOMMENDATION
原文传递
A New Evaluation Algorithm for the Influence of User in Social Network 被引量:6
16
作者 JIANG Wei GAO Mengdi +1 位作者 WANG Xiaoxi WU Xianda 《China Communications》 SCIE CSCD 2016年第2期200-206,共7页
Online social networks have gradually permeated into every aspect of people's life.As a research hotspot in social network, user influence is of theoretical and practical significant for information transmission, ... Online social networks have gradually permeated into every aspect of people's life.As a research hotspot in social network, user influence is of theoretical and practical significant for information transmission, optimization and integration. A prominent application is a viral marketing campaign which aims to use a small number of targeted infl uence users to initiate cascades of infl uence that create a global increase in product adoption. In this paper, we analyze mainly evaluation methods of user infl uence based on IDM evaluation model, Page Rank evaluation model, use behavior model and some other popular influence evaluation models in currently social network. And then, we extract the core idea of these models to build our influence evaluation model from two aspects, relationship and activity. Finally, the proposed approach was validated on real world datasets,and the result of experiments shows that our method is both effective and stable. 展开更多
关键词 social networks INFLUENCE opinionleaders
在线阅读 下载PDF
Mitigation Strategy against Cascading Failures on Social Networks 被引量:4
17
作者 YI Chengqi BAO Yuanyuan +1 位作者 JIANG Jingchi XUE Yibo 《China Communications》 SCIE CSCD 2014年第8期37-46,共10页
Cascading failures are common phenomena in many of real-world networks,such as power grids,Internet,transportation networks and social networks.It's worth noting that once one or a few users on a social network ar... Cascading failures are common phenomena in many of real-world networks,such as power grids,Internet,transportation networks and social networks.It's worth noting that once one or a few users on a social network are unavailable for some reasons,they are more likely to influence a large portion of social network.Therefore,an effective mitigation strategy is very critical for avoiding or reducing the impact of cascading failures.In this paper,we firstly quantify the user loads and construct the processes of cascading dynamics,then elaborate the more reasonable mechanism of sharing the extra user loads with considering the features of social networks,and further propose a novel mitigation strategy on social networks against cascading failures.Based on the realworld social network datasets,we evaluate the effectiveness and efficiency of the novel mitigation strategy.The experimental results show that this mitigation strategy can reduce the impact of cascading failures effectively and maintain the network connectivity better with lower cost.These findings are very useful for rationally advertising and may be helpful for avoiding various disasters of cascading failures on many real-world networks. 展开更多
关键词 social networks mitigationstrategy cascading failures betweennesscentrality cascading dynamics
在线阅读 下载PDF
Recommending Friends Instantly in Location-based Mobile Social Networks 被引量:4
18
作者 QIAO Xiuquan SU Jianchong +4 位作者 ZHANG Jinsong XU Wangli WU Budan XUE Sida CHEN Junliang 《China Communications》 SCIE CSCD 2014年第2期109-127,共19页
Differently from the general online social network(OSN),locationbased mobile social network(LMSN),which seamlessly integrates mobile computing and social computing technologies,has unique characteristics of temporal,s... Differently from the general online social network(OSN),locationbased mobile social network(LMSN),which seamlessly integrates mobile computing and social computing technologies,has unique characteristics of temporal,spatial and social correlation.Recommending friends instantly based on current location of users in the real world has become increasingly popular in LMSN.However,the existing friend recommendation methods based on topological structures of a social network or non-topological information such as similar user profiles cannot well address the instant making friends in the real world.In this article,we analyze users' check-in behavior in a real LMSN site named Gowalla.According to this analysis,we present an approach of recommending friends instantly for LMSN users by considering the real-time physical location proximity,offline behavior similarity and friendship network information in the virtual community simultaneously.This approach effectively bridges the gap between the offline behavior of users in the real world and online friendship network information in the virtual community.Finally,we use the real user check-in dataset of Gowalla to verify the effectiveness of our approach. 展开更多
关键词 mobile social network service friend recommendation location-basedservice location proximity user behaviorsimilarity singular value decomposition
在线阅读 下载PDF
Optimal Deep Learning-based Cyberattack Detection and Classification Technique on Social Networks 被引量:4
19
作者 Amani Abdulrahman Albraikan Siwar Ben Haj Hassine +5 位作者 Suliman Mohamed Fati Fahd NAl-Wesabi Anwer Mustafa Hilal Abdelwahed Motwakel Manar Ahmed Hamza Mesfer Al Duhayyim 《Computers, Materials & Continua》 SCIE EI 2022年第7期907-923,共17页
Cyberbullying(CB)is a distressing online behavior that disturbs mental health significantly.Earlier studies have employed statistical and Machine Learning(ML)techniques for CB detection.With this motivation,the curren... Cyberbullying(CB)is a distressing online behavior that disturbs mental health significantly.Earlier studies have employed statistical and Machine Learning(ML)techniques for CB detection.With this motivation,the current paper presents an Optimal Deep Learning-based Cyberbullying Detection and Classification(ODL-CDC)technique for CB detection in social networks.The proposed ODL-CDC technique involves different processes such as pre-processing,prediction,and hyperparameter optimization.In addition,GloVe approach is employed in the generation of word embedding.Besides,the pre-processed data is fed into BidirectionalGated Recurrent Neural Network(BiGRNN)model for prediction.Moreover,hyperparameter tuning of BiGRNN model is carried out with the help of Search and Rescue Optimization(SRO)algorithm.In order to validate the improved classification performance of ODL-CDC technique,a comprehensive experimental analysis was carried out upon benchmark dataset and the results were inspected under varying aspects.A detailed comparative study portrayed the superiority of the proposed ODL-CDC technique over recent techniques,in terms of performance,with the maximum accuracy of 92.45%. 展开更多
关键词 CYBERSECURITY CYBERBULLYING social networks parameter tuning deep learning metaheuristics
在线阅读 下载PDF
The Research on Social Networks Public Opinion Propagation Influence Models and Its Controllability 被引量:10
20
作者 Lejun Zhang Tong Wang +3 位作者 Zilong Jin Nan Su Chunhui Zhao Yongjun He 《China Communications》 SCIE CSCD 2018年第7期98-110,共13页
Public opinion propagation control is one of the hot topics in contemporary social network research. With the rapid dissemination of information over the Internet, the traditional isolation and vaccination strategies ... Public opinion propagation control is one of the hot topics in contemporary social network research. With the rapid dissemination of information over the Internet, the traditional isolation and vaccination strategies can no longer achieve satisfactory results. A positive guidance technology for public opinion diffusion is urgently needed. First, based on the analysis of influence network controllability and public opinion diffusion, a positive guidance technology is proposed and a new model that supports external control is established. Second, in combination with the influence network, a public opinion propagation influence network model is designed and a public opinion control point selection algorithm(POCDNSA) is proposed. Finally, An experiment verified that this algorithm can lead to users receiving the correct guidance quickly and accurately, reducing the impact of false public opinion information; the effect of CELF is no better than that of the POCDNSA algorithm. The main reason is that the former is completely based on the diffusion cascade information contained in the training data, but does not consider the specific situation of the network structure and the diffusion of public opinion information in the closed set. thus, the effectiveness and feasibility of the algorithm is proven. The findings of this article therefore provide useful insights for the implementation of public opinion control. 展开更多
关键词 social network public opinion propagation control influence network
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部