Jun-li BU, Can PENG, Yi ZHENG, et al. Model to find incarnated accounts in micro-blogging for public opinion supervision[J]. Journal on Communications, 2014, 35(Z2): 228-232.
DOI:
Jun-li BU, Can PENG, Yi ZHENG, et al. Model to find incarnated accounts in micro-blogging for public opinion supervision[J]. Journal on Communications, 2014, 35(Z2): 228-232. DOI: 10.3969/j.issn.1000-436x.2014.z2.031.
Model to find incarnated accounts in micro-blogging for public opinion supervision
Micro-blogging has played an important role in online social networks
and it has become a valuable source of public opinions.So there is a huge challenge to supervise public opinions in micro-blogging network.Incarnated accounts is a special kind of accounts that appeared during the supervision of public opinions.Strengthening the supervision of these accounts has great significance.The precondition for supervision is to discover them.In order to find incarnated accounts
a model targeted their characteristic based on the approach of timing and similarity is proposed
then the effectiveness of the model in Sina micro-blogging is verified.
ZAFARANI R , LIU H . Connecting corresponding identities across communities [A ] . ICWSM [C ] . 2009 . 354 - 357 .
ZAFARANI R , LIU H . Connecting users across social media sites:a behavioral-modeling approach [A ] . KDD’13 [C ] . 2013 . 41 - 49 .
OLIVIER D V . Mining E-mail authorship [A ] . KDD-2000 Workshop on Text Mining,ACM International conference on knowledge Discovery and Data Mining [C ] . Boston,USA , 2000 .
OLIVIER D V , ANDERSON A , CORNEY M , et al . Mining E-mail content for author identification forensic [J ] . SIGMOD Record , 2001 , 30 ( 4 ): 55 - 64 .
OLIVIER D V , ANDERSON A , CORNEY M , et al . Multi-topic E-mail authorship attribution forensics [A ] . ACM Conference on Computer Security Workshop on Data Mining for Security Applications,Philadelphia , 2001 .
PARIDHI J , PONNURANGAM K , ANUPAM J . @I seek‘fbme’:identifying users across multiple online social networks [A ] . IW3C2 [C ] . 2013 .
ZI C , STEVEN G , HAINING W , et al . Who is tweeting on Twitter:human,bot,or cyborg? [A ] . ACSAC '10:Proceedings of the 26th Annual Computer Security Applications Conference [C ] . 2010 . 21 - 30 .