Information Propagation Prediction Based on Key Users Authentication in Microblogging

被引:0
|
作者
Yu, Miao [1 ]
Zhang, Yongzheng [1 ]
Zang, Tianning [1 ]
Wang, Yipeng [1 ]
Wang, Yijing [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
关键词
D O I
10.1155/2018/7024842
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In microblogging, key users are a significant factor for information propagation. Key users can affect information propagation size while retweeting the information. In this paper, to predict information propagation, we propose a novel linear model based on key users authentication. This model mines key users to dynamically improve the linear model while predicting information propagation. So our model can not only predict information propagation but also mine key users. Experimental results show that our model can achieve remarkable efficiency on predicting information propagation problem in real microblogging networks. At the same time, our model can find the key users who affect information propagation.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] Intelligent Pervasive Network Authentication S/Key based Device Authentication
    Lee, Deok Gyu
    Han, Jong-Wook
    Park, Doo Soon
    Lee, Im Yeong
    2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 1422 - +
  • [42] An evaluation of authentication methods for smartphone based on users' preferences
    Sari, P. K.
    Ratnasari, G. S.
    Prasetio, A.
    INTERNATIONAL CONFERENCE ON INNOVATION IN ENGINEERING AND VOCATIONAL EDUCATION, 2016, 128
  • [43] Secure enterprise information system a mutual authentication scheme for roaming users using memorable information
    Yang, Lin
    Ruan, Xinghua
    Xu, Jingdong
    Wu, Gongyi
    RESEARCH AND PRACTICAL ISSUES OF ENTERPRISE INFORMATION SYSTEMS II, VOL 1, 2008, 254 : 195 - +
  • [44] Dynamic Authentication of Smartphone Users Based on Touchscreen Gestures
    Shatha J. Alghamdi
    Lamiaa A. Elrefaei
    Arabian Journal for Science and Engineering, 2018, 43 : 789 - 810
  • [45] Dynamic Authentication of Smartphone Users Based on Touchscreen Gestures
    Alghamdi, Shatha J.
    Elrefaei, Lamiaa A.
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (02) : 789 - 810
  • [46] Sensor-based Implicit Authentication of Smartphone Users
    Lee, Wei-Han
    Lee, Ruby B.
    2017 47TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2017, : 309 - 320
  • [47] Password-based authentication and the experiences of end users
    Ezugwu, Assumpta
    Ukwandu, Elochukwu
    Ugwu, Celestine
    Ezema, Modesta
    Olebara, Comfort
    Ndunagu, Juliana
    Ofusori, Lizzy
    Ome, Uchenna
    SCIENTIFIC AFRICAN, 2023, 21
  • [48] Secure enterprise information systems: A mutual authentication scheme for roaming users using memorable information
    College of information Technical Science, Nankai University, Tianjin
    300071, China
    IFIP Advances in Information and Communication Technology, 2007, (195-200)
  • [49] Group-Based Authentication and Key Agreement
    Yu-Wen Chen
    Jui-Tang Wang
    Kuang-Hui Chi
    Chien-Chao Tseng
    Wireless Personal Communications, 2012, 62 : 965 - 979
  • [50] Authentication Based on Secret-Key Generation
    Willems, Frans M. J.
    Ignatenko, Tanya
    2012 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2012,