Information Propagation Prediction Based on Key Users Authentication in Microblogging

被引:0
|
作者
Yu, Miao [1 ]
Zhang, Yongzheng [1 ]
Zang, Tianning [1 ]
Wang, Yipeng [1 ]
Wang, Yijing [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
关键词
D O I
10.1155/2018/7024842
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In microblogging, key users are a significant factor for information propagation. Key users can affect information propagation size while retweeting the information. In this paper, to predict information propagation, we propose a novel linear model based on key users authentication. This model mines key users to dynamically improve the linear model while predicting information propagation. So our model can not only predict information propagation but also mine key users. Experimental results show that our model can achieve remarkable efficiency on predicting information propagation problem in real microblogging networks. At the same time, our model can find the key users who affect information propagation.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] User Path Prediction Based Key Caching and Authentication Mechanism for Broadband Wireless Networks
    Rajakumar Arul
    Gunasekaran Raja
    Kottilingam Kottursamy
    Pavithra Sathiyanarayanan
    Swaminathan Venkatraman
    Wireless Personal Communications, 2017, 94 : 2645 - 2664
  • [22] User Path Prediction Based Key Caching and Authentication Mechanism for Broadband Wireless Networks
    Arul, Rajakumar
    Raja, Gunasekaran
    Kottursamy, Kottilingam
    Sathiyanarayanan, Pavithra
    Venkatraman, Swaminathan
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 2645 - 2664
  • [23] A Novel Authentication Protocol for Sensitive Information Privacy Protection Using Dynamic key Based Group Key Management
    Wu, Xianping
    Ngo, Huy Hoang
    Le, Phu Dung
    Srinivasan, Balasubramaniam
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 1113 - 1119
  • [24] Public-key encryption and authentication of quantum information
    Liang Min
    Yang Li
    SCIENCE CHINA-PHYSICS MECHANICS & ASTRONOMY, 2012, 55 (09) : 1618 - 1629
  • [25] Public-key encryption and authentication of quantum information
    Min Liang
    Li Yang
    Science China Physics, Mechanics and Astronomy, 2012, 55 : 1618 - 1629
  • [26] Public-key encryption and authentication of quantum information
    LIANG Min 1
    2 Graduate University of Chinese Academy of Sciences
    Science China(Physics,Mechanics & Astronomy), 2012, (09) : 1618 - 1629
  • [27] On robust key agreement based on public key authentication
    Hao, Feng
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (01) : 77 - 87
  • [28] On Robust Key Agreement Based on Public Key Authentication
    Hao, Feng
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2010, 6052 : 383 - 390
  • [29] Authentication and Key Establishment in WSN Based on Key Predistribution
    Shenets, N. N.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2022, 56 (08) : 947 - 956
  • [30] Authentication and Key Establishment in WSN Based on Key Predistribution
    N. N. Shenets
    Automatic Control and Computer Sciences, 2022, 56 : 947 - 956