计算机科学 ›› 2022, Vol. 49 ›› Issue (6A): 280-284.doi: 10.11896/jsjkx.210500043
杜鸿毅, 杨华, 刘艳红, 杨鸿鹏
DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng
摘要: 针对目前已有网络信息传播模型都假设信息网络中所有已感染节点都会感染易感染节点,不能客观地反映信息传播具有时效性的问题,文中基于平均场理论,从信息传播的宏观角度出发,提出了一个新的网络媒体信息传播动力学模型。根据网络信息传播的实际情况,所提模型假设只有新感染的节点才会感染信息网络中易感染节点,而且易感染节点有两种途径变为已感染节点,一种是社交网络中已感染节点的传播,另一种是用户随机浏览。进一步地,基于图论理论将模型中节点的状态及其转换关系抽象为加权有向图,并且基于贝叶斯定理,将节点间的状态转换表示为概率事件,给出了事件发生的概率表达式,进而确定了状态转化关系矩阵。最后,运用高斯-赛德尔迭代法对模型进行数值求解,数值仿真结果表明,在线媒体信息传播具有时效性,热点事件会在一天之内达到传播高峰,之后传播范围迅速下降。紧接着,运用百度指数热点事件的统计数据对模型进行有效性验证,结果表明,所提模型比传统模型能更准确地反映网络信息的扩散趋势。
中图分类号:
[1] ARNABOLDI V,CONTI M,PASSARELLA A,et al.On line social networks and information diffusion:the role of ego networks[J].Online Social Networks & Media,2017,1(6):44-55. [2] JIN L,CHEN Y,WANG T,et al.Understanding user behavior in online social networks:A survey[J].IEEE Communications Magazine,2013,51(9):144-150. [3] LI Y M,SHIU Y L.A diffusion mechanism for social advertising over microblogs[J].Decision Support Systems,2012,54:9-22. [4] ZHOU D H,HAN W B.DiffRank:A Novel Algorithm for Information Diffusion Detection in Social Networks[J].Chinese Journal of Computers,2014,37(4):884-893. [5] LIU X Y,HE D B.Research on of Competitive Nonlinear Dynamic Information Diffusion Modeling in Online Social Network[J].Chinese Journal of Computers,2019,42(9):1-20. [6] SANG C Y,LI T,TIAN S.SFTRD:A novel ingormation propagation model in heterogeneous networks:Modeling and restraining strategy[J].Physica A,2019,524:475-490. [7] CHIASSERINI C F,GARETTO M,LEONARDI E.Social network de-anonymization under scale-free user relations[J].IEEE/ACM Transactions on Networking,2016,24(6):3756-3769. [8] KO H,LEE J,PACK S.An opportunistic push scheme for online social networking services in heterogeneous wireless networks[J].IEEE Transactions on Network & Service Management,2017,14(2):416-428. [9] MA Z E,ZHOU Y C.Mathematical modelling and study on infectious disease dynamics [M].Beijing:Science Press,2004:3-10. [10] LIU D,YIN Y W,SONG M.Microblog Information Diffusion:Simulation Based on SIR Model[J].Journal of Beijing Univer-sity of Posts and Telecommunications(Social Sciences Edition),2014,16(3):28-33. [11] WAN Y H,WANG X C.Rumor spreading model with conformity effect[J].Journal of Computer Applications,2016,36(9):2381-2385. [12] HU X,LI W G,HU Q,et al.SIRS Model and Stability Based on Open Cyber Ecosystem[C]//2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Disco-very.2018. [13] PIQUEIRA J R C,ARAUJO V O A.Modified epidemiological model for computer viruses[J].Applied Mathematics and Computation,2009,213:355-360. [14] ZHENG Z R,GUO F,WANG Z F,et al.Study on Microblog Propagation Model Based on Aanlysis of User Behavior[J].Computer Science,2016,43(12):41-46. [15] CHEN K Y.Empirical analysis of novel coronavirus outbreak based on SEIR model[J].Statistics and Management,2020,35(6):31-38. [16] YUAN H,CHEN G Q.Network virus-epidemic model with the point-to-group information propagation[J].Applied Mathema-tics and Computation,2008,206:357-367. [17] SONG L P,ZHANG R P.Dynamical analysis for a malwarepropagation model in wireless sensor network[J].Journal of Measurement of Science and Instrumentation,2016,7(2):136-144. [18] ZHU G H,JIANG G P,XIA L L.Rumor spreading model considering conformity phenomena in complex social networks[J].Computer Science,2016,43(2):135-139. [19] CUI Z L,QIAN X D.Research on optimization of blockchain social Network Information Transmission Model[J].Computer Engineering and Applications,2021,57(7):59-69. |
[1] | 柳杰灵, 凌晓波, 张蕾, 王博, 王之梁, 李子木, 张辉, 杨家海, 吴程楠. 基于战术关联的网络安全风险评估框架 Network Security Risk Assessment Framework Based on Tactical Correlation 计算机科学, 2022, 49(9): 306-311. https://doi.org/10.11896/jsjkx.210600171 |
[2] | 王磊, 李晓宇. 基于随机洋葱路由的LBS移动隐私保护方案 LBS Mobile Privacy Protection Scheme Based on Random Onion Routing 计算机科学, 2022, 49(9): 347-354. https://doi.org/10.11896/jsjkx.210800077 |
[3] | 赵冬梅, 吴亚星, 张红斌. 基于IPSO-BiLSTM的网络安全态势预测 Network Security Situation Prediction Based on IPSO-BiLSTM 计算机科学, 2022, 49(7): 357-362. https://doi.org/10.11896/jsjkx.210900103 |
[4] | 吕鹏鹏, 王少影, 周文芳, 连阳阳, 高丽芳. 基于进化神经网络的电力信息网安全态势量化方法 Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network 计算机科学, 2022, 49(6A): 588-593. https://doi.org/10.11896/jsjkx.210200151 |
[5] | 邓凯, 杨频, 李益洲, 杨星, 曾凡瑞, 张振毓. 一种可快速迁移的领域知识图谱构建方法 Fast and Transmissible Domain Knowledge Graph Construction Method 计算机科学, 2022, 49(6A): 100-108. https://doi.org/10.11896/jsjkx.210900018 |
[6] | 陶礼靖, 邱菡, 朱俊虎, 李航天. 面向网络安全训练评估的受训者行为描述模型 Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment 计算机科学, 2022, 49(6A): 480-484. https://doi.org/10.11896/jsjkx.210800048 |
[7] | 张师鹏, 李永忠. 基于降噪自编码器和三支决策的入侵检测方法 Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions 计算机科学, 2021, 48(9): 345-351. https://doi.org/10.11896/jsjkx.200500059 |
[8] | 周仕承, 刘京菊, 钟晓峰, 卢灿举. 基于深度强化学习的智能化渗透测试路径发现 Intelligent Penetration Testing Path Discovery Based on Deep Reinforcement Learning 计算机科学, 2021, 48(7): 40-46. https://doi.org/10.11896/jsjkx.210400057 |
[9] | 李贝贝, 宋佳芮, 杜卿芸, 何俊江. DRL-IDS:基于深度强化学习的工业物联网入侵检测系统 DRL-IDS:Deep Reinforcement Learning Based Intrusion Detection System for Industrial Internet of Things 计算机科学, 2021, 48(7): 47-54. https://doi.org/10.11896/jsjkx.210400021 |
[10] | 陈海彪, 黄声勇, 蔡洁锐. 一个基于智能电网的跨层路由的信任评估协议 Trust Evaluation Protocol for Cross-layer Routing Based on Smart Grid 计算机科学, 2021, 48(6A): 491-497. https://doi.org/10.11896/jsjkx.201000169 |
[11] | 王金恒, 单志龙, 谭汉松, 王煜林. 基于遗传优化PNN神经网络的网络安全态势评估 Network Security Situation Assessment Based on Genetic Optimized PNN Neural Network 计算机科学, 2021, 48(6): 338-342. https://doi.org/10.11896/jsjkx.201200239 |
[12] | 张凯, 刘京菊. 基于吸收Markov链的网络入侵路径分析方法 Attack Path Analysis Method Based on Absorbing Markov Chain 计算机科学, 2021, 48(5): 294-300. https://doi.org/10.11896/jsjkx.200700108 |
[13] | 陈明豪, 祝跃飞, 芦斌, 翟懿, 李玎. 基于Attention-CNN的加密流量应用类型识别 Classification of Application Type of Encrypted Traffic Based on Attention-CNN 计算机科学, 2021, 48(4): 325-332. https://doi.org/10.11896/jsjkx.200900155 |
[14] | 刘全明, 李尹楠, 郭婷, 李岩纬. 基于Borderline-SMOTE和双Attention的入侵检测方法 Intrusion Detection Method Based on Borderline-SMOTE and Double Attention 计算机科学, 2021, 48(3): 327-332. https://doi.org/10.11896/jsjkx.200600025 |
[15] | 蒋建峰, 孙金霞, 尤澜涛. 基于粒子群优化算法的无线传感网络安全分簇策略 Security Clustering Strategy Based on Particle Swarm Optimization Algorithm in Wireless Sensor Network 计算机科学, 2021, 48(11A): 452-455. https://doi.org/10.11896/jsjkx.210900131 |
|