Information Propagation Prediction Based on Key Users Authentication in Microblogging

被引:0
作者
Yu, Miao [1 ]
Zhang, Yongzheng [1 ]
Zang, Tianning [1 ]
Wang, Yipeng [1 ]
Wang, Yijing [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
关键词
D O I
10.1155/2018/7024842
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In microblogging, key users are a significant factor for information propagation. Key users can affect information propagation size while retweeting the information. In this paper, to predict information propagation, we propose a novel linear model based on key users authentication. This model mines key users to dynamically improve the linear model while predicting information propagation. So our model can not only predict information propagation but also mine key users. Experimental results show that our model can achieve remarkable efficiency on predicting information propagation problem in real microblogging networks. At the same time, our model can find the key users who affect information propagation.
引用
收藏
页数:7
相关论文
共 50 条
[41]   Intelligent Pervasive Network Authentication S/Key based Device Authentication [J].
Lee, Deok Gyu ;
Han, Jong-Wook ;
Park, Doo Soon ;
Lee, Im Yeong .
2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, :1422-+
[42]   An evaluation of authentication methods for smartphone based on users' preferences [J].
Sari, P. K. ;
Ratnasari, G. S. ;
Prasetio, A. .
INTERNATIONAL CONFERENCE ON INNOVATION IN ENGINEERING AND VOCATIONAL EDUCATION, 2016, 128
[43]   Secure enterprise information system a mutual authentication scheme for roaming users using memorable information [J].
Yang, Lin ;
Ruan, Xinghua ;
Xu, Jingdong ;
Wu, Gongyi .
RESEARCH AND PRACTICAL ISSUES OF ENTERPRISE INFORMATION SYSTEMS II, VOL 1, 2008, 254 :195-+
[44]   Dynamic Authentication of Smartphone Users Based on Touchscreen Gestures [J].
Shatha J. Alghamdi ;
Lamiaa A. Elrefaei .
Arabian Journal for Science and Engineering, 2018, 43 :789-810
[45]   Dynamic Authentication of Smartphone Users Based on Touchscreen Gestures [J].
Alghamdi, Shatha J. ;
Elrefaei, Lamiaa A. .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (02) :789-810
[46]   Sensor-based Implicit Authentication of Smartphone Users [J].
Lee, Wei-Han ;
Lee, Ruby B. .
2017 47TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2017, :309-320
[47]   Password-based authentication and the experiences of end users [J].
Ezugwu, Assumpta ;
Ukwandu, Elochukwu ;
Ugwu, Celestine ;
Ezema, Modesta ;
Olebara, Comfort ;
Ndunagu, Juliana ;
Ofusori, Lizzy ;
Ome, Uchenna .
SCIENTIFIC AFRICAN, 2023, 21
[48]   Secure enterprise information systems: A mutual authentication scheme for roaming users using memorable information [J].
College of information Technical Science, Nankai University, Tianjin ;
300071, China .
IFIP Advances in Information and Communication Technology, 2007, (195-200)
[49]   Group-Based Authentication and Key Agreement [J].
Yu-Wen Chen ;
Jui-Tang Wang ;
Kuang-Hui Chi ;
Chien-Chao Tseng .
Wireless Personal Communications, 2012, 62 :965-979
[50]   Authentication Based on Secret-Key Generation [J].
Willems, Frans M. J. ;
Ignatenko, Tanya .
2012 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2012,