Review of User Identification across Social Networks:The Complex Network Approach

被引:0
|
作者
Xing L. [1 ]
Deng K.-K. [1 ]
Wu H.-H. [1 ]
Xie P. [1 ]
机构
[1] School of Information Engineering, Henan University of Science and Technology, Luoyang
来源
Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China | 2020年 / 49卷 / 06期
关键词
Across social networks; Complex network; Data mining; Entity user; User identification;
D O I
10.12178/1001-0548.2019182
中图分类号
学科分类号
摘要
Social network is a complex network with interaction characteristics. It can link nodes in different social networks by using the network characteristics of complex network, analyze the connections between nodes, and combine with the related matching algorithm to identify user's virtual accounts, which can help social networks to provide users with better services. This paper presents a systematic review on across social networks user identification techniques proposed in the field of data mining. Then the methods for calculating the similarity of the three types of user identification techniques and the unified identification framework are elaborated in detail. The relevant evaluation metrics are used to evaluate the classified user identification technique performances. Finally, the future research directions of across social networks user identification techniques are prospected based on the analysis of the research status. Copyright ©2020 Journal of University of Electronic Science and Technology of China. All rights reserved.
引用
收藏
页码:905 / 917
页数:12
相关论文
共 83 条
  • [1] LIU X Z, XIA T, YU Y Y, Et al., Cross social media recommendation, The International AAAI Conference on Web and Social Media, pp. 1-10, (2016)
  • [2] ZAFARANI R, TANG L, LIU H., User identification across social media, ACM Transactions on Knowledge Discovery from Data, 10, 2, pp. 1-30, (2015)
  • [3] LIU K, ZHANG L M, ZHOU L J., Survey of deep learning applied in information recommendation system, Journal of Chinese Computer Systems, 40, 4, pp. 738-743, (2019)
  • [4] CHEN Ling-jiao, CAI Shi-min, ZHANG Qian-ming, Et al., Improved research on resource-allocation recommendation algorithm based on trust relationship, Journal of University of Electronic Science and Technology of China, 48, 3, pp. 449-455, (2019)
  • [5] ZHONG E H, FAN W, YANG Q., User behavior learning and transfer in composite social networks, ACM Transactions on Knowledge Discovery from Data, 8, 1, pp. 1-32, (2014)
  • [6] SHEN W, WANG J Y, LUO P, Et al., Linking named entities in Tweets with knowledge base via user interest modeling, Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 68-76, (2013)
  • [7] SHAO Peng, HU Ping, The influence mechanism of special members on opinion evolution of group members in complex network, Journal of University of Electronic Science and Technology of China, 48, 4, pp. 604-612, (2019)
  • [8] WICKER S B., The loss of location privacy in the cellular age, Communications of the ACM, 55, 8, pp. 60-68, (2012)
  • [9] NARAYANAN A, SHMATIKOV V., Robust de-anonymization of large sparse datasets, Proceedings of the IEEE Symposium on Security and Privacy, pp. 111-125, (2008)
  • [10] WANG Lu, MENG Xiao-feng, Location privacy preservation in big data era: A survey, Journal of Software, 25, 4, pp. 693-712, (2014)