Computer Science ›› 2018, Vol. 45 ›› Issue (6): 41-45.doi: 10.11896/j.issn.1002-137X.2018.06.007
• WISA2019 • Previous Articles Next Articles
ZHANG Yu, GAO Ke-ning, YU Ge
CLC Number:
[1]LIBEN-NOWELL D,KLEINBERG J.The link-prediction problem for social network[J].Journal of the American Society for Information Science and Technology,2007,58(7):1019-1031. [2]LÜ L,ZHOU T.Link prediction in complex networks:A survey[J].Physica A Statistical Mechanics & Its Applications,2011,390(16):1150-1170. [3]HASAN M A,ZAKI M J.A Survey of Link Prediction in Social Networks[M]//Social Networks Data Analytics.Springer US,2011:243-275. [4]LICHTENWALTER R N,LUSSIER J T,CHAWLA N V.New perspectives and methods in link prediction[C]//ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.Washington DC,USA,2010:243-252. [5]HASAN,MOHAMMAD A.Link Prediction using Supervised Learning[J].Proc of Sdm Workshop on Link Analysis Counter-terrorism & Security,2006,30(9):798-805. [6]HSU C C,LAI Y A,CHEN W H,et al.Unsupervised Ranking using Graph Structures and Node Attributes[C]//Tenth ACM International Conference on Web Search and Data Mining.ACM,2017:771-779. [7]BACKSTROM L,LESKOVEC J.Supervised random walks: predicting and recommending links in social networks[C]//ACM International Conference on Web Search & Data Mining.ACM,2011:635-644. [8]YIN Z,GUPTA M,WENINGER T,et al.LINKREC:a unified framework for link recommendation with user attributes and graph structure[C]//International Conference on World Wide Web(WWW 2010).Raleigh,North Carolina,USA,2010:1211-1212. [9]YIN Z,GUPTA M,WENINGER T,et al.A Unified Framework for Link Recommendation Using Random Walks[C]//Procee-dings of the 2010 International Conference on Advances in Social Networks Analysis and Mining.IEEE Computer Society,2010:152-159. [10]GONG N Z,TALWALKAR A,MACKEY L,et al.Joint Link Prediction and Attribute Inference Using a Social-Attribute Network[J].Acm Transactions on Intelligent Systems & Technology,2014,5(2):1-20. [11]TONG H,FALOUTSOS C,PAN J Y.Fast Random Walk with Restart and Its Applications[C]//International Conference on Data Mining.IEEE,2006:613-622. |
[1] | SONG Jie, LIANG Mei-yu, XUE Zhe, DU Jun-ping, KOU Fei-fei. Scientific Paper Heterogeneous Graph Node Representation Learning Method Based onUnsupervised Clustering Level [J]. Computer Science, 2022, 49(9): 64-69. |
[2] | HUANG Li, ZHU Yan, LI Chun-ping. Author’s Academic Behavior Prediction Based on Heterogeneous Network Representation Learning [J]. Computer Science, 2022, 49(9): 76-82. |
[3] | WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293. |
[4] | WEI Peng, MA Yu-liang, YUAN Ye, WU An-biao. Study on Temporal Influence Maximization Driven by User Behavior [J]. Computer Science, 2022, 49(6): 119-126. |
[5] | YU Ai-xin, FENG Xiu-fang, SUN Jing-yu. Social Trust Recommendation Algorithm Combining Item Similarity [J]. Computer Science, 2022, 49(5): 144-151. |
[6] | LI Yong, WU Jing-peng, ZHANG Zhong-ying, ZHANG Qiang. Link Prediction for Node Featureless Networks Based on Faster Attention Mechanism [J]. Computer Science, 2022, 49(4): 43-48. |
[7] | CHANG Ya-wen, YANG Bo, GAO Yue-lin, HUANG Jing-yun. Modeling and Analysis of WeChat Official Account Information Dissemination Based on SEIR [J]. Computer Science, 2022, 49(4): 56-66. |
[8] | ZUO Yuan-lin, GONG Yue-jiao, CHEN Wei-neng. Budget-aware Influence Maximization in Social Networks [J]. Computer Science, 2022, 49(4): 100-109. |
[9] | GUO Lei, MA Ting-huai. Friend Closeness Based User Matching [J]. Computer Science, 2022, 49(3): 113-120. |
[10] | SHAO Yu, CHEN Ling, LIU Wei. Maximum Likelihood-based Method for Locating Source of Negative Influence Spreading Under Independent Cascade Model [J]. Computer Science, 2022, 49(2): 204-215. |
[11] | ZHAO Xue-lei, JI Xin-sheng, LIU Shu-xin, LI Ying-le, LI Hai-tao. Link Prediction Method for Directed Networks Based on Path Connection Strength [J]. Computer Science, 2022, 49(2): 216-222. |
[12] | WANG Jian, WANG Yu-cui, HUANG Meng-jie. False Information in Social Networks:Definition,Detection and Control [J]. Computer Science, 2021, 48(8): 263-277. |
[13] | TAN Qi, ZHANG Feng-li, WANG Ting, WANG Rui-jin, ZHOU Shi-jie. Social Network User Influence Evaluation Algorithm Integrating Structure Centrality [J]. Computer Science, 2021, 48(7): 124-129. |
[14] | ZHANG Ren-zhi, ZHU Yan. Malicious User Detection Method for Social Network Based on Active Learning [J]. Computer Science, 2021, 48(6): 332-337. |
[15] | HU Xin-tong, SHA Chao-feng, LIU Yan-jun. Post-processing Network Embedding Algorithm with Random Projection and Principal Component Analysis [J]. Computer Science, 2021, 48(5): 124-129. |
|