期刊文献+
共找到639篇文章
< 1 2 32 >
每页显示 20 50 100
A Dynamic Social Network Data Publishing Algorithm Based on Differential Privacy 被引量:2
1
作者 Zhenpeng Liu Yawei Dong +1 位作者 Xuan Zhao Bin Zhang 《Journal of Information Security》 2017年第4期328-338,共11页
Social network contains the interaction between social members, which constitutes the structure and attribute of social network. The interactive relationship of social network contains a lot of personal privacy inform... Social network contains the interaction between social members, which constitutes the structure and attribute of social network. The interactive relationship of social network contains a lot of personal privacy information. The direct release of social network data will cause the disclosure of privacy information. Aiming at the dynamic characteristics of social network data release, a new dynamic social network data publishing method based on differential privacy was proposed. This method was consistent with differential privacy. It is named DDPA (Dynamic Differential Privacy Algorithm). DDPA algorithm is an improvement of privacy protection algorithm in static social network data publishing. DDPA adds noise which follows Laplace to network edge weights. DDPA identifies the edge weight information that changes as the number of iterations increases, adding the privacy protection budget. Through experiments on real data sets, the results show that the DDPA algorithm satisfies the user’s privacy requirement in social network. DDPA reduces the execution time brought by iterations and reduces the information loss rate of graph structure. 展开更多
关键词 DYNAMIC social network data PUBLISHING DIFFERENTIAL PRIVACY
在线阅读 下载PDF
Attacks and Countermeasures in Social Network Data Publishing
2
作者 YANG Mengmeng ZHU Tianqing +1 位作者 ZHOU Wanlei XIANG Yang 《ZTE Communications》 2016年第B06期2-9,共8页
With the increasing prevalence of social networks, more and more social network data are published for many applications, such as social network analysis and data mining. However, this brings privacy problems. For exa... With the increasing prevalence of social networks, more and more social network data are published for many applications, such as social network analysis and data mining. However, this brings privacy problems. For example, adversaries can get sensitive information of some individuals easily with little background knowledge. How to publish social network data for analysis purpose while preserving the privacy of individuals has raised many concerns. Many algorithms have been proposed to address this issue. In this paper, we discuss this privacy problem from two aspects: attack models and countermeasures. We analyse privacy conceres, model the background knowledge that adversary may utilize and review the recently developed attack models. We then survey the state-of-the-art privacy preserving methods in two categories: anonymization methods and differential privacy methods. We also provide research directions in this area. 展开更多
关键词 social network data publishing attack model privacy preserving
在线阅读 下载PDF
Predict Edges in Fliker Social Network Using Data Mining Method
3
作者 Amir Hossein Rasekh Zeinab Liaghat Ala Mahdavi 《Intelligent Information Management》 2012年第3期60-65,共6页
Using social networking services is becoming more popular day by day. The websites of the social networks like face-book currently are among the most popular internet services just after giant portals such as Yahoo, M... Using social networking services is becoming more popular day by day. The websites of the social networks like face-book currently are among the most popular internet services just after giant portals such as Yahoo, MSN and search engines like Google. One of the main problems in analyzing these networks is the prediction of relationships between people in the network. The purpose of this paper is to forecast the friendship of a person with a new person using existing data on Flickr website accurately. In this paper, we achieved about 90% percent correct prediction with regards to the results which are obtained by using data mining methods. 展开更多
关键词 social network data MINING LINK PREDICTION Regression
暂未订购
Security Threat and Data Consumption as Mojor Nuisance of Social Media on Wi-Fi Network 被引量:1
4
作者 Fuseini Inusah Ibrahim Mohammed Gunu Gaddafi Abdul-Salaam 《International Journal of Communications, Network and System Sciences》 2021年第2期15-29,共15页
This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data cons... This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data consumption of those platforms on the network. Network Mapper (Nmap Zenmap) Graphical User Interface 7.80 application was used to scan the various social media platforms to identify the protocols, ports, services, etc. to enable in accessing the vulnerability of the network. Data consumption of users’ mobile devices was collected and analyzed. Device Accounting (DA) based on the various social media applications was used. The results of the analysis revealed that the network is prone to attacks due to the nature of the protocols, ports, and services on social media applications. The numerous users with average monthly data consumption per user of 4 gigabytes, 300 megabytes on social media alone are a clear indication of high traffic as well as the cost of maintaining the network. A URL filtering of the social media websites was proposed on Rockus Outdoor AP to help curb the nuisance. 展开更多
关键词 data Consumption Device Accounting Mobile Devices social Media WiFi network Rockus Outdoor AP
在线阅读 下载PDF
Studying Group Dynamics through Social Networks Analysis in a Medical Community
5
作者 Ruben P. Albuquerque Jonice Oliveira +2 位作者 Fabrício F. Faria Rafael Monclar Jano M. de Souza 《Social Networking》 2014年第2期134-141,共8页
In 2008, the Brazilian Department of Science and Technology created the INCTs (Brazilian Science and Technology Institutes). One of them was the Cancer Control INCT. Due to its importance and considering that there ar... In 2008, the Brazilian Department of Science and Technology created the INCTs (Brazilian Science and Technology Institutes). One of them was the Cancer Control INCT. Due to its importance and considering that there are different groups working together in the same area, it is important that they collaborate intensely. Envisioning an empowerment of scientific collaboration, the BRINCA project was created to support a set of analyses of the social networks from this particular INCT. These analyses were created by mining curricular and publications bases, and identifying different types of scientific relationships and areas. We were able to observe, for instance, how the interaction is amongst researchers from related areas, which researchers were more collaborative and which ones were isolated from the network. These analyzes were used by the INCT coordination to understand and act to improve scientific collaboration. 展开更多
关键词 social networks SCIENTIFIC COLLABORATIONS data MINING
暂未订购
GatherTweet: A Python Package for Collecting Social Media Data on Online Events
6
作者 Claudia Kann Sarah Hashash +1 位作者 Zachary Steinert-Threlkeld R. Michael Alvarez 《Journal of Computer and Communications》 2023年第2期172-193,共22页
Social media plays a crucial role in the organization of massive social movements. However, the sheer quantity of data generated by the events as well as the data collection restrictions that researchers encounter, le... Social media plays a crucial role in the organization of massive social movements. However, the sheer quantity of data generated by the events as well as the data collection restrictions that researchers encounter, leads to a series of challenges for researchers who want to analyze dynamic public discourse and opinion in response to and in the creation of world events. In this paper we present gatherTweet, a Python package that helps researchers efficiently collect social media data for events that are composed of many decentralized actions (across both space and time). The package is useful for studies that require analysis of the organizational or baseline messaging before an action, the action itself, and the effects of the action on subsequent public discourse. By capturing these aspects of world events gatherTweet enables the study of events and actions like protests, natural disasters, and elections. 展开更多
关键词 data Science Movements social Media data TWITTER network Science data Mining PYTHON
在线阅读 下载PDF
Sentiment Analysis on the Social Networks Using Stream Algorithms
7
作者 Nathan Aston Timothy Munson +3 位作者 Jacob Liddle Garrett Hartshaw Dane Livingston Wei Hu 《Journal of Data Analysis and Information Processing》 2014年第2期60-66,共7页
The rising popularity of online social networks (OSNs), such as Twitter, Facebook, MySpace, and LinkedIn, in recent years has sparked great interest in sentiment analysis on their data. While many methods exist for id... The rising popularity of online social networks (OSNs), such as Twitter, Facebook, MySpace, and LinkedIn, in recent years has sparked great interest in sentiment analysis on their data. While many methods exist for identifying sentiment in OSNs such as communication pattern mining and classification based on emoticon and parts of speech, the majority of them utilize a suboptimal batch mode learning approach when analyzing a large amount of real time data. As an alternative we present a stream algorithm using Modified Balanced Winnow for sentiment analysis on OSNs. Tested on three real-world network datasets, the performance of our sentiment predictions is close to that of batch learning with the ability to detect important features dynamically for sentiment analysis in data streams. These top features reveal key words important to the analysis of sentiment. 展开更多
关键词 Modified BALANCED WINNOW SENTIMENT Analysis TWITTER Online social networks Feature Selection data STREAMS
在线阅读 下载PDF
Social Network Analysis Combined to Neural Networks to Predict Churn in Mobile Carriers
8
作者 Carlos Andre Reis Pinheiro Markus Helfert 《通讯和计算机(中英文版)》 2012年第2期155-158,共4页
关键词 移动运营商 神经网络 网络分析 社会 测流 客户群 业务流程 运营成本
在线阅读 下载PDF
企业数据资产信息披露的同群效应研究
9
作者 刘杨方姝 易志高 《技术经济》 北大核心 2026年第1期107-119,共13页
基于2008—2022年中国A股上市公司的数据,研究中国上市企业数据资产信息披露的同群效应的存在性、作用机制、异质性及经济后果。研究发现,企业的数据资产信息披露水平受到行业同群企业的影响,即数据资产信息披露存在同群效应。具体而言... 基于2008—2022年中国A股上市公司的数据,研究中国上市企业数据资产信息披露的同群效应的存在性、作用机制、异质性及经济后果。研究发现,企业的数据资产信息披露水平受到行业同群企业的影响,即数据资产信息披露存在同群效应。具体而言,从内生驱动和外生推动两个层面进行机制分析,企业的竞争趋利、共生避险和声誉管理是同群行为产生的内生驱动力,共同分析师和共同股东则是触发企业同群行为的重要社会网络。此外,数据资产信息披露的行业同群效应存在异质性,即在数据知识产权保护程度较高的地区、数据信息含量丰富的行业及数字化应用能力较强的企业,数据资产信息披露的同群效应更为显著。最后,还进一步考察了数据资产信息披露同群效应产生的经济后果和非经济后果,发现数据资产信息披露同群效应不仅能改善行业融资环境,还有助于提升整个行业的媒体关注度。研究拓展了数据资产信息披露的影响因素和同群效应的研究边界,揭示了企业披露数据资产信息带来的正面效应,为企业制定数据资产信息披露决策提供了重要的经验证据。 展开更多
关键词 数据资产 信息披露 同群效应 社会网络 知识产权保护 数字技术应用
在线阅读 下载PDF
基于融合特征的VGAT-VGAN跨社交网络身份关联算法
10
作者 潘语泉 袁得嵛 +1 位作者 贾源 王安然 《数据与计算发展前沿(中英文)》 2026年第1期103-118,共16页
【目的】跨社交网络身份关联的研究,主要是判别来自不同社交网络的虚拟用户是否属于同一自然人。【方法】面对正负样本不均衡的情况,首先,提出了FD-Struc2vec和DW-Word2vec算法,分别用于提取节点的结构特征和用户名的文本特征;其次,通过... 【目的】跨社交网络身份关联的研究,主要是判别来自不同社交网络的虚拟用户是否属于同一自然人。【方法】面对正负样本不均衡的情况,首先,提出了FD-Struc2vec和DW-Word2vec算法,分别用于提取节点的结构特征和用户名的文本特征;其次,通过VGAT优化结构特征表示,并将两类特征融合,形成了全新的用户特征向量表达方式,同时使用VGAN增加正样本数量;最后,提出了Feature-MLP,在神经网络中为结构特征和文本特征赋予不同权重,实现身份关联。【结果】与WLAlign等基线算法在真实数据集下比较,结果表明,在P、R、F1值3个指标中均存在10%以上的提高,证明了算法的有效性。【局限】由于社交网络拥有大量的用户和复杂的好友关系,加之算法结构的复杂性,导致整体的计算需求较大,算法的效率有待提升。 展开更多
关键词 跨社交网络 身份关联 特征融合 数据增强 深度学习
在线阅读 下载PDF
More than Just a Game: The Power of Social Media on Super Bowl XLVI
11
作者 Fernanda Bruno dos Santos Jonice Oliveira 《Social Networking》 2014年第2期142-145,共4页
The evolution of social media in the recent years promoted the appearance of a new category: social media based on check-in. It enables the user to define their identity through information sharing. This paper aims to... The evolution of social media in the recent years promoted the appearance of a new category: social media based on check-in. It enables the user to define their identity through information sharing. This paper aims to show the evolution of these media highlighting the effects and changes they cause in society through Super Bowl XLVI scenario, besides indicating the important role they have for the companies and marketing. 展开更多
关键词 social Media data Mining MARKETING social networks GAMIFICATION
在线阅读 下载PDF
From Mind to Products:Towards Social Manufacturing and Service 被引量:5
12
作者 Gang Xiong Fei-Yue Wang +5 位作者 Timo R. Nyberg Xiuqin Shang Mengchu Zhou Zhen Shen Shuangshuang Li Chao Guo 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2018年第1期47-57,共11页
After reviewing the development of industrial manufacturing, a novel concept called social manufacturing(SM) and service are proposed as an innovative manufacturing solution for the coming personalized customization e... After reviewing the development of industrial manufacturing, a novel concept called social manufacturing(SM) and service are proposed as an innovative manufacturing solution for the coming personalized customization era. SM can realize a customer's requirements of "from mind to products", and fulfill tangible and intangible needs of a prosumer, i.e., producer and consumer at the same time. It represents a manufacturing trend,and is expected to become popular in more and more industries.First, a comparison between mass customization and SM is given out, and the basis and motivation from social network to SM is analyzed. Then, its basic theories and supporting technologies,like Internet of Things(Io T), social networks, cloud computing,3 D printing, and intelligent systems, are introduced and analyzed,and an SM platform prototype is developed. Finally, three transformation modes towards SM and 3 D printing are suggested for different user cases. 展开更多
关键词 Big data cloud computing intelligent system social manufacturing social networks 3D printing
在线阅读 下载PDF
基于深度学习的时序数据异常检测研究综述 被引量:4
13
作者 陈红松 刘新蕊 +1 位作者 陶子美 王志恒 《信息网络安全》 北大核心 2025年第3期364-391,共28页
时序数据异常检测是数据挖掘及网络安全领域的重要研究课题。文章以时序数据异常检测技术为研究对象,运用文献调研与比较分析方法,深入探讨了深度学习模型在该领域的应用及其研究进展。文章首先介绍了深度时序数据异常检测的定义与应用... 时序数据异常检测是数据挖掘及网络安全领域的重要研究课题。文章以时序数据异常检测技术为研究对象,运用文献调研与比较分析方法,深入探讨了深度学习模型在该领域的应用及其研究进展。文章首先介绍了深度时序数据异常检测的定义与应用;其次,提出了深度时序数据异常检测面临的9个问题与挑战,并将时序数据异常分为10类,枚举了16种典型的时序数据异常检测数据集,其中包括5种社交网络舆情安全领域相关数据集;再次,文章将深度时序数据异常检测模型进行分类研究,分析总结了近50个相关模型,其中包括基于半监督增量学习的社交网络不良信息发布者异常检测,进一步地,文章依据深度学习模型的学习模式将模型划分为基于重构、基于预测、基于重构与预测融合3种类型,并对这些模型的优缺点及应用场景进行综合分析;最后,文章从8个方面展望了深度时序异常检测技术的未来研究方向,分析了每个方向的潜在研究价值及技术瓶颈。 展开更多
关键词 深度学习 时序数据 异常检测 模型分类 社交网络
在线阅读 下载PDF
大数据背景下基于网络社交的开源情报研究
14
作者 冯玉花 张春燕 《信息与电脑》 2025年第24期4-6,共3页
文章通过分析网络社交开源情报(Open Source Intelligence,OSINT)的特征,探索开源情报的收集与数据分析过程,并利用智能技术将开源情报工作的各个阶段有效衔接,以提升情报分析的准确性。文章探讨了网络社交开源情报在国家安全、舆情监... 文章通过分析网络社交开源情报(Open Source Intelligence,OSINT)的特征,探索开源情报的收集与数据分析过程,并利用智能技术将开源情报工作的各个阶段有效衔接,以提升情报分析的准确性。文章探讨了网络社交开源情报在国家安全、舆情监测、灾害预警等领域的应用,并分析了其面临的挑战。面对当前技术革新,情报工作人员需提升综合素养。 展开更多
关键词 网络社交 开源情报 数据分析
在线阅读 下载PDF
网络舆情环境下基于SNA和DEA方法的关联企业风险评估
15
作者 安庆贤 彭雯静 +1 位作者 王萍 高显 《运筹与管理》 北大核心 2025年第10期119-126,共8页
现实中,企业之间普遍存在关联关系。个别企业发生风险往往会对关联较强的企业产生影响,如何刻画该风险对关联企业的影响极其重要。网络舆情一定程度上揭示了企业的形象和经营状况,且舆情风险对关联企业影响较大,评估企业综合风险时有必... 现实中,企业之间普遍存在关联关系。个别企业发生风险往往会对关联较强的企业产生影响,如何刻画该风险对关联企业的影响极其重要。网络舆情一定程度上揭示了企业的形象和经营状况,且舆情风险对关联企业影响较大,评估企业综合风险时有必要考虑舆情风险的关联影响。数据包络分析(Data Envelopment Analysis,DEA)是一种有效评价方法,也适用于企业综合风险评估问题,但该方法现有研究鲜有考虑个体间的关联关系。鉴于此,本文基于社会网络分析(Social Network Analysis,SNA)和DEA,提出一种考虑个体关联的企业风险评估方法。首先,构建企业关联网络,其次考虑个体属性和网络拓扑结构,结合节点全局重要性、节点属性和节点相似性定量刻画关联影响程度。然后基于DEA构建综合风险评估模型,以评估企业综合风险并揭示个体关联对企业风险的影响。最后,将其应用于股东关联的房地产企业以验证方法的有效性,同时也为企业和监管方提供决策支持。 展开更多
关键词 数据包络分析 风险评估 社会网络分析 关联企业
在线阅读 下载PDF
基于多因子权重与GloVe模型的社交网络用户情感主题分类方法
16
作者 席文 《西安文理学院学报(自然科学版)》 2025年第2期35-42,共8页
社交网络用户生成的内容具有多样性和非结构化的特点,导致文本数据中蕴含的情感复杂多变,难以准确识别与分类.为此,提出基于多因子权重与GloVe模型的社交网络用户情感主题分类方法.利用数据挖掘技术采集社交网络用户的电子文本,提取其... 社交网络用户生成的内容具有多样性和非结构化的特点,导致文本数据中蕴含的情感复杂多变,难以准确识别与分类.为此,提出基于多因子权重与GloVe模型的社交网络用户情感主题分类方法.利用数据挖掘技术采集社交网络用户的电子文本,提取其中的多因子权重,结合GloVe模型分析文本与主题之间的关系,从而对文本语义进行增强,引入核主成分分析方法提取并选择最有效的文本分类特征,以此为依据,以文本特征作为支持向量机分类器的输入,从而根据待测文本的类别概率确定文本的情感类型.实验结果表明,利用所提方法对不同数据集进行情感主题分类,得到的对数损失率始终保持在0.40%以内,整体分类精度较高. 展开更多
关键词 数据挖掘 社交网络 用户 情感主题 文本分类
在线阅读 下载PDF
基于社会网络分析的城市绿地健身网络特征研究——以上海市内环区域为例 被引量:2
17
作者 刘颂 白钊成 +1 位作者 柳迪子 沈培宇 《中国园林》 北大核心 2025年第4期23-30,共8页
绿地是城市居民健身活动的重要载体,但传统的绿地网络分析方法难以反映居民的实际使用模式。以上海市内环区域为例,利用健身轨迹数据构建城市绿地网络,并运用社会网络分析方法,从节点、子群和整体3个层次分析了绿地健身网络的结构特征... 绿地是城市居民健身活动的重要载体,但传统的绿地网络分析方法难以反映居民的实际使用模式。以上海市内环区域为例,利用健身轨迹数据构建城市绿地网络,并运用社会网络分析方法,从节点、子群和整体3个层次分析了绿地健身网络的结构特征。研究显示:1)绿地节点呈现出“核心-边缘”结构,节点中心度受绿地内部道路长度、周围写字楼面积等内外部环境因素影响;2)健身网络存在显著的区域隔离,利用结构洞识别到了工业用地阻隔、滨水空间私有化、里弄绿化缺失、交通干线阻隔4类典型的绿地隔离情景;3)健身网络整体连接稀疏且同质性较高,稳定性较低。本研究基于“真实连通性”视角,为构建支持人群活动的城市绿地网络提供数据驱动的规划支持。 展开更多
关键词 风景园林 社会网络分析 绿地网络 健康城市 健身轨迹数据 数据驱动
在线阅读 下载PDF
政府数据开放领域研究热点的可视化分析
18
作者 韩靖 卫玮 《科技资讯》 2025年第21期248-252,共5页
目的 分析政府数据开放相关研究的现状,并对该领域研究热点进行讨论,明确政府数据开放领域各要素之间存在的网络关系。方法 选取中国知网中含主题词“政府数据开放”的期刊文献作为研究对象,在对政府数据开放研究主题汇总整合的基础上,... 目的 分析政府数据开放相关研究的现状,并对该领域研究热点进行讨论,明确政府数据开放领域各要素之间存在的网络关系。方法 选取中国知网中含主题词“政府数据开放”的期刊文献作为研究对象,在对政府数据开放研究主题汇总整合的基础上,采用社会网络分析法,运用可视化软件,对政府数据开放领域文献进行梳理。结果 当前在政府数据开放领域的研究热点中,各高频关键词之间的连接程度较为紧密,这也是相关研究内容中的关键部分和主要方向,表明学者重点关注的内容较为统一。结论 政府开放数据仍须解决数据开放的质量、协同治理等问题,以实现数据资源的最大化利用和社会经济的高质量发展。 展开更多
关键词 政府数据开放 社会网络分析 关键词 中心度 凝聚子群
在线阅读 下载PDF
基于社会网络理论的延安精神与统一战线的关系研究
19
作者 曹黎侠 王雨晴 +2 位作者 徐欣雨 张英 段玉梅 《榆林学院学报》 2025年第3期22-28,共7页
在中国特色社会主义的新时代,继承并弘扬“延安精神”,进一步推动新时代“统一战线”工作,显得尤为重要,正因为此,“延安精神”与“统一战线”关系的研究成为专家学者关注的热点之一。论文以统计模型定量化分析的方法研究“延安精神”... 在中国特色社会主义的新时代,继承并弘扬“延安精神”,进一步推动新时代“统一战线”工作,显得尤为重要,正因为此,“延安精神”与“统一战线”关系的研究成为专家学者关注的热点之一。论文以统计模型定量化分析的方法研究“延安精神”与“统一战线”的关系,提出以社会网络理论促进“延安精神”在“统一战线”中发挥大作用的新思路。文章中以知网等媒体平台的数据为依托,应用词频分析、时间序列分析、多元回归分析等统计模型,探索了“延安精神”与“统一战线”的定量化关系,再运用社会网络的拓扑特征、蝴蝶效应、弱连接优势等理论,将数据统计分析的结果在“统一战线”关系网络中进行扩散。本文以“数据驱动模型+社会网络理论”的方法对其他党建相关研究具有一定的借鉴意义,其研究结论对“统一战线”工作也具有重要的指导作用。 展开更多
关键词 延安精神 统一战线 数据驱动模型 社会网络理论 蝴蝶效应
在线阅读 下载PDF
社交网络用户图像敏感数据计量研究 被引量:1
20
作者 杨瑞仙 李航毅 +1 位作者 于馨凯 毕崇武 《现代情报》 北大核心 2025年第6期153-164,共12页
[目的/意义]探究社交网络用户图像敏感数据计量方案,对于拓展数据隐私研究范畴、促进社交网络平台的健康发展具有重要意义。[方法/过程]首先,融合隐私感知和客观标准构建社交网络隐私图像库;其次,基于卷积神经网络和信息熵理论构建社交... [目的/意义]探究社交网络用户图像敏感数据计量方案,对于拓展数据隐私研究范畴、促进社交网络平台的健康发展具有重要意义。[方法/过程]首先,融合隐私感知和客观标准构建社交网络隐私图像库;其次,基于卷积神经网络和信息熵理论构建社交网络用户图像敏感数据计量模型;第三,获取新浪微博用户公开发布的图像数据,通过自建社交网络用户隐私分类表标注数据集并进行监督学习;最后,根据年龄特征比例抽样新浪微博用户,分析其隐私泄露风险并分级预警。[结果/结论]用户年龄反作用于隐私披露行为,社交网络用户图像数据敏感性排序从高到低为:个人财产信息、个人网络通信信息、个人医疗健康信息、个人位置信息和个人识别信息。 展开更多
关键词 社交网络 图像敏感数据 卷积神经网络 信息熵理论 隐私计量
在线阅读 下载PDF
上一页 1 2 32 下一页 到第
使用帮助 返回顶部