计算机科学 ›› 2022, Vol. 49 ›› Issue (3): 113-120.doi: 10.11896/jsjkx.210200137

• 数据库&大数据&数据科学 • 上一篇    下一篇

基于好友亲密度的用户匹配

郭磊, 马廷淮   

  1. 南京信息工程大学计算机与软件学院 南京210044
  • 收稿日期:2021-02-22 修回日期:2021-07-02 出版日期:2022-03-15 发布日期:2022-03-15
  • 通讯作者: 马廷淮(thma@nuist.edu.cn)
  • 作者简介:(865818209@qq.com)
  • 基金资助:
    国家自然科学基金(U1736105);国家重点研发计划(2021YFE0104400)

Friend Closeness Based User Matching

GUO Lei, MA Ting-huai   

  1. College of Computer and Software,Nanjing University of Information Science & Technology,Nanjing 210044,China
  • Received:2021-02-22 Revised:2021-07-02 Online:2022-03-15 Published:2022-03-15
  • About author:GUO Lei,born in 1988,postgraduate.His main research interests include data mining and data sharing.
    MA Ting-huai,born in 1974,Ph.D,professor,is a senior member of China Computer Federation.His main research interests include data mining,data sharing and privacy protection.
  • Supported by:
    National Natural Science Foundation of China(U1736105) and National Key Research and Development Program of China(2021YFE0104400).

摘要: 用户匹配的目的是检测来自不同社交网络的用户是否是同一个人。现有的研究主要集中在用户属性和网络嵌入上,而这些研究方法往往忽略了用户与好友间的亲密关系。因此,文中提出一种基于好友亲密度的用户匹配算法(FCUM)。该算法是一种半监督、端到端的跨社交网络用户匹配算法,其中注意力机制被用于量化用户与好友之间的亲密度。好友亲密度的量化能够提高FCUM的泛化能力。通过在单一目标函数中对用户个体相似性和亲密好友相似性进行联合优化,能充分利用用户个体相似性和亲密好友相似性。文中还设计了一种双向匹配策略,用于解决人工标记匹配用户代价较高的问题。在真实数据集上的实验表明,FCUM算法优于其他只考虑用户个体相似性的方法。在如今用户隐私保护限制愈发严格、难以获取用户其他完整属性信息的情形下,该算法具有实用和易于推广的特性。

关键词: 好友亲密度, 社交网络, 网络嵌入, 用户匹配, 注意力机制

Abstract: The typical aim of user matching is to detect the same individuals cross different social networks.The existing efforts in this field usually focus on users’ attributes and network embedding,but these methods often ignore the closeness between users and their friends.To this end,we present a friend closeness based user matching algorithm(FCUM).It is a semi-supervised and end-to-end cross social networks user matching algorithm.Attention mechanism is used to quantify the closeness between users and their friends.Quantification of close friends improves the generalization ability of the FCUM.We consider both individual similarity and their close friend similarity by jointly optimizing them in a single objective function.Due to the expensive costs of labeling new match users for training FCUM,we also design a bi-directional matching strategy.Experiments on real datasets illustrate that FCUM outperforms other state-of-the-art methods that only consider the individual similarity.In the situation that the privacy protection of users is becoming more and more strict and it is difficult to obtain other complete attribute information of users,the algorithm has the characteristics of practicality and easy promotion.

Key words: Attention mechanism, Friend closeness, Network embedding, Social networks, User matching

中图分类号: 

  • TP311
[1]LU C T,XIE S,SHAO W,et al.Item Recommendation forEmerging Online Businesses[C]//IJCAI.2016:3797-3803.
[2]LI C Y,LIN S D.Matching users and items across domains toimprove the recommendation quality[C]//Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.2014:801-810.
[3]GUILLE A,HACID H,FAVRE C,et al.Information diffusion in online social networks:A survey[J].ACM Sigmod Record,2013,42(2):17-28.
[4]ZHANG J,YU P S,ZHOU Z H.Meta-path based multi-network collective link prediction[C]//Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Disco-very and Data Mining.2014:1286-1295.
[5]ZHANG J,CHEN J,ZHI S,et al.Link prediction across aligned networks with sparse and low rank matrix estimation[C]//2017 IEEE 33rd International Conference on Data Engineering (ICDE).IEEE,2017:971-982.
[6]ZAFARANI R,LIU H.Connecting corresponding identitiesacross communities[C]//Proceedings of the International AAAI Conference on Web and Social Media.2009.
[7]LIU J,ZHANG F,SONG X,et al.What's in a name? An unsupervised approach to link users across communities[C]//Proceedings of the Sixth ACM International Conference on Web Search and Data Mining.2013:495-504.
[8]PERITO D,CASTELLUCCIA C,KAAFAR M A,et al.Howunique and traceable are usernames?[C]//International Symposium on Privacy Enhancing Technologies Symposium.Berlin:Springer,2011:1-17.
[9]LIU S,WANG S,ZHU F,et al.Hydra:Large-scale social identity linkage via heterogeneous behavior modeling[C]//Procee-dings of the 2014 ACM SIGMOD International Conference on Management of Data.2014:51-62.
[10]ZAFARANI R,LIU H.Connecting users across social mediasites:a behavioral-modeling approach[C]//Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.2013:41-49.
[11]GOGA O,LEI H,PARTHASARATHIS H K,et al.Exploiting innocuous activity for correlating users across sites[C]//Proceedings of the 22nd International Conference on World Wide Web.2013:447-458.
[12]ZHANG Z,WANG H Z,DING X O,et al.Identification of Same User in Social Networks[J].Computer Science,2019,46(9):93-98.
[13]ZHOU F,LIU L,ZHANG K,et al.Deeplink:A deep learning approach for user identity linkage[C]//IEEE INFOCOM 2018-IEEE Conference on Computer Communications.IEEE,2018:1313-1321.
[14]WU S H,CHIEN H H,LINK H,et al.Learning the consistent behavior of common users for target node prediction across social networks[C]//International Conference on Machine Lear-ning.PMLR,2014:298-306.
[15]ZHANG J,PHILIP S Y.Integrated anchor and social link predictions across social networks[C]//Twenty-fourth International Joint Conference on Artificial Intelligence.2015.
[16]TAN S,GUAN Z,CAI D,et al.Mapping users across networks by manifold alignment on hypergraph[C]//Proceedings of the AAAI Conference on Artificial Intelligence.2014.
[17]MALHOTRA A,TOTTI L,MEIRA J W,et al.Studying user footprints in different online social networks[C]//2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.IEEE,2012:1065-1070.
[18]KONG X,ZHANG J,YU P S.Inferring anchor links acrossmultiple heterogeneous social networks[C]//Proceedings of the 22nd ACM International Conference on Information & Know-ledge Management.2013:179-188.
[19]ZHANG Y,TANG J,YANG Z,et al.Cosnet:Connecting heterogeneous social networks with local and global consistency[C]//Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.2015:1485-1494.
[20]LIU L,CHEUNG W K,LI X,et al.Aligning Users across Social Networks Using Network Embedding[C]//IJCIA.2016:1774-1780.
[21]ZHAO W,TAN S,GUAN Z,et al.Learning to map social network users by unified manifold alignment on hypergraph[J].IEEE Transactions on Neural Networks and Learning Systems,2018,29(12):5834-5846.
[22]HAN N,QIAO S J,YUAN C A,et al.AFast Parallel Community DetectionAlgorithm for Mobile Social Networks[J].Journal of Chongqing University of Technology(Natural Science),2020,34(1):94-102.
[23]LIU L,ZHANG Y,FU S,et al.ABNE:an attention-based network embedding for user alignment across social networks[J].IEEE Access,2019,7:23595-23605.
[24]BAYATI M,GERRITSEN M,GLEICHD F,et al.Algorithmsfor large,sparse network alignment problems[C]//2009 Ninth IEEE International Conference on Data Mining.IEEE,2009:705-710.
[25]DING Y,WEI H,PAN Z S,et al.Survey of Network Representation Learning[J].Computer Science,2020,47(9):52-59.
[26]PEROZZI B,AL-RFOU R,SKIENAS.Deepwalk:Online lear-ning of social representations[C]//Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.2014:701-710.
[27]MIKOLOV T,SUTSKEVER I,CHEN K,et al.Distributed representations of words and phrases and their compositionality[J].arXiv:1310.4546,2013.
[28]DERR T,MA Y,TANG J.Signed graph convolutional networks[C]//2018 IEEE International Conference on Data Mining (ICDM).IEEE,2018:929-934.
[29]MNIH A,TEH Y W.A fast and simple algorithm for training neural probabilistic language models[J].arXiv:1206.6426,2012.
[30]SANG L,XU M,QIAN S,et al.AAANE:Attention-based ad-versarial autoencoder for multi-scale network embedding[C]//Pacific-Asia Conference on Knowledge Discovery and Data Mining.Cham:Springer,2019:3-14.
[31]PRADO A,PLANTEVIT M,ROBARDET C,et al.Mininggraph topological patterns:Finding covariations among vertex descriptors[J].IEEE Transactions on Knowledge and Data Engineering,2012,25(9):2090-2104.
[1] 周芳泉, 成卫青.
基于全局增强图神经网络的序列推荐
Sequence Recommendation Based on Global Enhanced Graph Neural Network
计算机科学, 2022, 49(9): 55-63. https://doi.org/10.11896/jsjkx.210700085
[2] 戴禹, 许林峰.
基于文本行匹配的跨图文本阅读方法
Cross-image Text Reading Method Based on Text Line Matching
计算机科学, 2022, 49(9): 139-145. https://doi.org/10.11896/jsjkx.220600032
[3] 周乐员, 张剑华, 袁甜甜, 陈胜勇.
多层注意力机制融合的序列到序列中国连续手语识别和翻译
Sequence-to-Sequence Chinese Continuous Sign Language Recognition and Translation with Multi- layer Attention Mechanism Fusion
计算机科学, 2022, 49(9): 155-161. https://doi.org/10.11896/jsjkx.210800026
[4] 熊丽琴, 曹雷, 赖俊, 陈希亮.
基于值分解的多智能体深度强化学习综述
Overview of Multi-agent Deep Reinforcement Learning Based on Value Factorization
计算机科学, 2022, 49(9): 172-182. https://doi.org/10.11896/jsjkx.210800112
[5] 饶志双, 贾真, 张凡, 李天瑞.
基于Key-Value关联记忆网络的知识图谱问答方法
Key-Value Relational Memory Networks for Question Answering over Knowledge Graph
计算机科学, 2022, 49(9): 202-207. https://doi.org/10.11896/jsjkx.220300277
[6] 朱承璋, 黄嘉儿, 肖亚龙, 王晗, 邹北骥.
基于注意力机制的医学影像深度哈希检索算法
Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism
计算机科学, 2022, 49(8): 113-119. https://doi.org/10.11896/jsjkx.210700153
[7] 孙奇, 吉根林, 张杰.
基于非局部注意力生成对抗网络的视频异常事件检测方法
Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection
计算机科学, 2022, 49(8): 172-177. https://doi.org/10.11896/jsjkx.210600061
[8] 闫佳丹, 贾彩燕.
基于双图神经网络信息融合的文本分类方法
Text Classification Method Based on Information Fusion of Dual-graph Neural Network
计算机科学, 2022, 49(8): 230-236. https://doi.org/10.11896/jsjkx.210600042
[9] 王剑, 彭雨琦, 赵宇斐, 杨健.
基于深度学习的社交网络舆情信息抽取方法综述
Survey of Social Network Public Opinion Information Extraction Based on Deep Learning
计算机科学, 2022, 49(8): 279-293. https://doi.org/10.11896/jsjkx.220300099
[10] 姜梦函, 李邵梅, 郑洪浩, 张建朋.
基于改进位置编码的谣言检测模型
Rumor Detection Model Based on Improved Position Embedding
计算机科学, 2022, 49(8): 330-335. https://doi.org/10.11896/jsjkx.210600046
[11] 汪鸣, 彭舰, 黄飞虎.
基于多时间尺度时空图网络的交通流量预测模型
Multi-time Scale Spatial-Temporal Graph Neural Network for Traffic Flow Prediction
计算机科学, 2022, 49(8): 40-48. https://doi.org/10.11896/jsjkx.220100188
[12] 金方焱, 王秀利.
融合RACNN和BiLSTM的金融领域事件隐式因果关系抽取
Implicit Causality Extraction of Financial Events Integrating RACNN and BiLSTM
计算机科学, 2022, 49(7): 179-186. https://doi.org/10.11896/jsjkx.210500190
[13] 熊罗庚, 郑尚, 邹海涛, 于化龙, 高尚.
融合双向门控循环单元和注意力机制的软件自承认技术债识别方法
Software Self-admitted Technical Debt Identification with Bidirectional Gate Recurrent Unit and Attention Mechanism
计算机科学, 2022, 49(7): 212-219. https://doi.org/10.11896/jsjkx.210500075
[14] 彭双, 伍江江, 陈浩, 杜春, 李军.
基于注意力神经网络的对地观测卫星星上自主任务规划方法
Satellite Onboard Observation Task Planning Based on Attention Neural Network
计算机科学, 2022, 49(7): 242-247. https://doi.org/10.11896/jsjkx.210500093
[15] 张颖涛, 张杰, 张睿, 张文强.
全局信息引导的真实图像风格迁移
Photorealistic Style Transfer Guided by Global Information
计算机科学, 2022, 49(7): 100-105. https://doi.org/10.11896/jsjkx.210600036
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!