Information Propagation Prediction Based on Key Users Authentication in Microblogging

被引:0
|
作者
Yu, Miao [1 ]
Zhang, Yongzheng [1 ]
Zang, Tianning [1 ]
Wang, Yipeng [1 ]
Wang, Yijing [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
关键词
D O I
10.1155/2018/7024842
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In microblogging, key users are a significant factor for information propagation. Key users can affect information propagation size while retweeting the information. In this paper, to predict information propagation, we propose a novel linear model based on key users authentication. This model mines key users to dynamically improve the linear model while predicting information propagation. So our model can not only predict information propagation but also mine key users. Experimental results show that our model can achieve remarkable efficiency on predicting information propagation problem in real microblogging networks. At the same time, our model can find the key users who affect information propagation.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] A Location Authentication Scheme Based On Adjacent Users
    Hua, Liang
    Dai, Jiazhu
    PROCEEDINGS OF 2014 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATICS AND COMPUTING (PIC), 2014, : 158 - 162
  • [32] A location authentication scheme based on adjacent users
    Hua, Liang
    Dai, Jiazhu
    PIC 2014 - Proceedings of 2014 IEEE International Conference on Progress in Informatics and Computing, 2014, : 158 - 162
  • [33] Evolutionary Prediction of Information Propagation Dynamics Based on Time Series Characteristics
    Wan, Jihong
    Chen, Xiaoliang
    Du, Yajun
    Jia, Mengmeng
    PROCEEDINGS OF 2018 5TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (CCIS), 2018, : 133 - 137
  • [34] Hybrid method for prediction of users' information behavior in the Internet based on bioinspired search
    Bova, V.
    Kravchenko, Yu
    Rodzin, S.
    Kuliev, E.
    INTERNATIONAL CONFERENCE: INFORMATION TECHNOLOGIES IN BUSINESS AND INDUSTRY, 2019, 1333
  • [35] A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems
    Xin Xu
    Ping Zhu
    Qiaoyan Wen
    Zhengping Jin
    Hua Zhang
    Lian He
    Journal of Medical Systems, 2014, 38
  • [36] A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems
    Xu, Xin
    Zhu, Ping
    Wen, Qiaoyan
    Jin, Zhengping
    Zhang, Hua
    He, Lian
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (01)
  • [37] An Authentication Key Establish Protocol for WSNs Based on Combined Key
    Qikun Zhang
    Junling Yuan
    Ge Guo
    Yong Gan
    Jianwei Zhang
    Wireless Personal Communications, 2018, 99 : 95 - 110
  • [38] An Authentication Key Establish Protocol for WSNs Based on Combined Key
    Zhang, Qikun
    Yuan, Junling
    Guo, Ge
    Gan, Yong
    Zhang, Jianwei
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 99 (01) : 95 - 110
  • [40] Secure Authentication from a Weak Key, without Leaking Information
    Bouman, Niek J.
    Fehr, Serge
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 246 - 265