• 综合
  • 标题
  • 关键词
  • 摘要
  • 学者
  • 期刊-刊名
  • 期刊-ISSN
  • 会议名称
搜索

作者:

Wang, Xiujuan (Wang, Xiujuan.) | Zheng, Qianqian (Zheng, Qianqian.) | Zheng, Kangfeng (Zheng, Kangfeng.) | Sui, Yi (Sui, Yi.) | Zhang, Jiayue (Zhang, Jiayue.)

收录:

EI

摘要:

Malicious social robots are the disseminators of malicious information on social networks, which seriously affect information security and network environments. Efficient and reliable classification of social robots is crucial for detecting information manipulation in social networks. Supervised classification based on manual feature extraction has been widely used in social robot detection. However, these methods not only involve the privacy of users but also ignore hidden feature information, especially the graph feature, and the label utilization rate of semi-supervised algorithms is low. Aiming at the problems of shallow feature extraction and low label utilization rate in existing social network robot detection methods, in this paper a robot detection scheme based on weighted network topology is proposed, which introduces an improved network representation learning algorithm to extract the local structure features of the network, and combined with the graph convolution network (GCN) algorithm based on the graph filter, to obtain the global structure features of the network. An end-to-end semi-supervised combination model (Semi-GSGCN) is established to detect malicious social robots. Experiments on a social network dataset (cresci-rtbust-2019) show that the proposed method has high versatility and effectiveness in detecting social robots. In addition, this method has a stronger insight into robots in social networks than other methods. © 2020 Tech Science Press. All rights reserved.

关键词:

Classification (of information) Economic and social effects Extraction Feature extraction Graph algorithms Learning algorithms Neural networks Security of data Semi-supervised learning Social robots Topology

作者机构:

  • [ 1 ] [Wang, Xiujuan]Information Technology Institute, Beijing University of Technology, Beijing; 100124, China
  • [ 2 ] [Zheng, Qianqian]Information Technology Institute, Beijing University of Technology, Beijing; 100124, China
  • [ 3 ] [Zheng, Kangfeng]School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing; 100876, China
  • [ 4 ] [Sui, Yi]Information Technology Institute, Beijing University of Technology, Beijing; 100124, China
  • [ 5 ] [Zhang, Jiayue]Information Technology Institute, Beijing University of Technology, Beijing; 100124, China

通讯作者信息:

  • [zheng, qianqian]information technology institute, beijing university of technology, beijing; 100124, china

查看成果更多字段

相关关键词:

相关文章:

来源 :

Computers, Materials and Continua

ISSN: 1546-2218

年份: 2020

期: 1

卷: 65

页码: 617-638

3 . 1 0 0

JCR@2022

ESI学科: COMPUTER SCIENCE;

ESI高被引阀值:34

JCR分区:2

被引次数:

WoS核心集被引频次: 0

SCOPUS被引频次: 4

ESI高被引论文在榜: 0 展开所有

万方被引频次:

中文被引频次:

近30日浏览量: 3

归属院系:

在线人数/总访问数:678/2898089
地址:北京工业大学图书馆(北京市朝阳区平乐园100号 邮编:100124) 联系我们:010-67392185
版权所有:北京工业大学图书馆 站点建设与维护:北京爱琴海乐之技术有限公司