Identifying Untrusted Weibo Users Based on Improved Dempster-Shafer Evidence Theory

被引:0
|
作者
Jianmin X. [1 ]
Kailin W. [1 ]
Shufang W. [2 ]
机构
[1] College of Cyberspace Security and Computer, Hebei University, Baoding
[2] College of Management, Hebei University, Baoding
关键词
Dempster-Shafer Evidence Theory; Microblog; Subjective Uncertainty; Untrusted Users;
D O I
10.11925/infotech.2096-3467.2022.0127
中图分类号
学科分类号
摘要
[Objective] This paper modifies the Dempster-Shafer evidence theory, aiming to identify untrusted Sina Weibo (Microblog) users with subjective uncertainties. [Methods] Firstly, we used the evidence distance to improve the original Dempster-Shafer evidence theory. Then, we transformed the credibility of historical posts into evidence, which was also merged to generate users’trust interval. Finally, we identified untrusted users with the Decision Tree algorithm and the trust interval. [Results] Compared with the existing methods, our new model reduced the processing time by 287.4 seconds, increased the F1 value by 31.9 percentage point, and received an optimal Chi-Square value of the consistency test. [Limitations] We only investigated the subjective uncertainties due to time decay and evidence conflict, and need to add the impacts of cognitive differences on subjective degrees. [Conclusions] The proposed method could effectively identify untrusted users from Sina Weibo. © 2022, Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:99 / 112
页数:13
相关论文
共 38 条
  • [1] Regulations on Ecological Governance of Network Information Content
  • [2] Yu Z D, Yu H Q., Untrusted User Detection in Microblogs, Proceedings of the 13th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 558-564, (2014)
  • [3] Dempster A P., Upper and Lower Probabilities Induced by a Multivalued Mapping, The Annals of Mathematical Statistics, 38, 2, pp. 325-339, (1967)
  • [4] Ersahin B, Aktas O, Kilinc D, Et al., Twitter Fake Account Detection, Proceedings of the 2017 International Conference on Computer Science and Engineering(UBMK), pp. 388-392, (2017)
  • [5] Wu Y H, Fang Y Z, Shang S K, Et al., A Novel Framework for Detecting Social Bots with Deep Neural Networks and Active Learning, Knowledge-Based Systems, 211, (2021)
  • [6] Liang Xiaohe, Tian Ruya, Wu Lei, Et al., Microblog Similarity Based on Super Network and Its Application in Microblog Public Opinion Topic Detection, Library and Information Service, 64, 11, pp. 77-86, (2020)
  • [7] Mccord M, Chuah M., Spam Detection on Twitter Using Traditional Classifiers, Proceedings of the 8th International Conference on Autonomic and Trusted Computing, pp. 175-186, (2011)
  • [8] Chen Huimin, Jin Sichen, Lin Wei, Et al., Quantitative Analysis on the Communication of COVID-19 Related Social Media Rumors, Journal of Computer Research and Development, 58, 7, pp. 1366-1384, (2021)
  • [9] Barbon S, Campos G F C, Tavares G M, Et al., Detection of Human, Legitimate Bot, and Malicious Bot in Online Social Networks Based on Wavelets, ACM Transactions on Multimedia Computing, Communications, and Applications, 14, 1s, (2018)
  • [10] Jia Junjie, Duan Chaoqiang, A Shilling Attack Detection Algorithm Based on Score Dispersion[J], Computer Engineering & Science, 44, 3, pp. 554-562, (2022)