Computer Science ›› 2021, Vol. 48 ›› Issue (6): 332-337.doi: 10.11896/jsjkx.200700151

• Information Security • Previous Articles     Next Articles

Malicious User Detection Method for Social Network Based on Active Learning

ZHANG Ren-zhi, ZHU Yan   

  1. School of Information Science and Technology,Southwest Jiaotong University,Chengdu 611756,China
  • Received:2020-07-24 Revised:2020-09-16 Online:2021-06-15 Published:2021-06-03
  • About author:ZHANG Ren-zhi,born in 1996,postgraduate.His main research interests include Web spam detection and graph neural network.(zrz59@qq.com)
    ZHU Yan,born in 1965,Ph.D,professor,Ph.D supervisor,is a member of China Computer Federation.Her main research interests include data mining,Web anomaly detection,big data mana-gement and intelligent analysis.
  • Supported by:
    Sichuan Science and Technology Project(2019YFSY0032).

Abstract: As a classification task,malicious user detection needs to label training samples.However,the scale of social networks is usually large,and it costs a lot to label all samples.In order to find out the more worthy samples in the case of limited labeled budget,and make full use of unlabeled samples to improve the detection performance of malicious users,a detection method based on graph neural network and active learning is proposed.The method is divided into two parts:detection module and active lear-ning module.Inspired by Transformer,the detection module improves the graph neural network GraphSAGE,flattens the aggregation process of each order neighbors of its nodes,so that higher-order neighbors can directly aggregate to the central node and reduce the information loss of high-order neighbors.Then,through ensemble learning,the extracted representations are used from different perspectives to complete the detection task.The active learning module measures the value of unlabeled samplesaccor-ding to the results of ensemble classification,and alternately uses detection module and active learning module in the sample labeling stage to guide the process of labeling sample,which is more conducive to the model classification.In the experimental stage,AUROC and AUPR are used as evaluation indexes to verify the effectiveness of the improved detection module on a real large-scale social network data set,and the reasons for the improvement are analyzed.Then,compared with the existing two similar active learning methods,the experimental results show that the proposed method has better classification performance in the case of labeling the same number of training samples.

Key words: Active learning, Graph neural network, Imbalanced data, Malicious user detection, Social network

CLC Number: 

  • TP183
[1]LI Y,WANG Y,MA X,et al.A Graph-Based Method for Active Outlier Detection With Limited Expert Feedback[J].IEEE Access,2019,7:152267-152277.
[2]DAS B,TOLONE W,PARANJAPE V.Identifying malicious social media contents using multi-view Context-Aware active learning[J].Future Generation Computer Systems-the International Journal of Escience,2019,100:365-379.
[3]JIA J T,MICHAEL T S,SANTIAGO S.Graph-based Semi-Supervised & Active Learning for Edge Flows[C]//Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.ACM,2019:761-771.
[4]DONG Z,ZHANG R,SHAO X.Automatic Annotation and Segmentation of Object Instances With Deep Active Curve Network[J].IEEE Access,2019,7:147501-147512.
[5]CHENG Y,NICOLÒ C,RICARDO S.Bayesian Semi-Supervised Learning with Graph Gaussian Processes[C]//Advances in Neural Information Processing Systems.2018:1683-1694.
[6]LI J,RONG Y,CHENG H,et al.Semi-Supervised Graph Classification:A Hierarchical Graph Perspective[C]//Proceedings of International Conference on World Wide Web.ACM,2019:972-982.
[7]HOU Y F,CHEN H Z,LI C J.A Representation LearningFramework for Property Graphs[C]//Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Disco-very and Data Mining.ACM,2019:65-73.
[8]HUANG W B,ZHANG T,RONG Y.Adaptive Sampling To-wards Fast Graph Representation Learning[C]//Advances in Neural Information Processing Systems.2018:4558-4567.
[9]CHIANG W L,LIU X Q,SI S,et al.Cluster-GCN:An Efficient Algorithm for Training Deep and Large Graph Convolutional Networks[C]//Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.ACM,2019:257-266.
[10]OZAN S,SILVIO S.Active Learning for Convolutional Neural Networks:A Core-Set Approach [C]//Proceedings of International Conference on Learning Representations.2018.
[11]PENG P,ZHANG W,ZHANG Y,et al.Cost sensitive active learning using bidirectional gated recurrent neural networks for imbalanced fault diagnosis[J].Neurocomputing,2020,407:232-245.
[12]HAMILTON W,YING Z,LESKOVEC J.Inductive Representation Learning on Large Graphs[C]//Advances in Neural Information Processing Systems.2017:1024-1034.
[13]CHEN J,MA T F,XIAO C.FastGCN:Fast Learning withGraph Convolutional Networks via Importance Sampling[C]//Proceedings of International Conference on Learning Representations.2018.
[14]ZENG H Q,ZHOU H K,AJITESH S,et al.GraphSAINT:Graph Sampling Based Inductive Learning Method[C]//Proceedings of International Conference on Learning Representations.2020.
[15]GAL Y,GHAHRAMANI Z.Dropout as A Bayesian Approxi-mation:Representing Model Uncertainty in Deep Learning[C]//Proceedings of International Conference on Machine Learning.2016:1050-1059.
[16]LAKSHMINARAYANAN B,PRITZEL A,BLUNDELL C.Simple and Scalable Predictive Uncertainty Estimation using Deep Ensembles[C]//Advances in Neural Information Proces-sing Systems.2017:6402-6413.
[17]LIN T Y,PRIYA G,HE K M,et al.Focal Loss for Dense Object Detection[C]//Proceedings of IEEE InternationalConference on Computer Vision.2017:2999-3007.
[18]SHOBEIR F,JAMES F,MADHUSUDANA S,et al.Collective Spammer Detection in Evolving Multi-Relational Social Networks[C]//Proceedings of the 25th ACM SIGKDD Internatio-nal Conference on Knowledge Discovery and Data Mining.ACM,2015:1769-1778.
[1] ZHOU Fang-quan, CHENG Wei-qing. Sequence Recommendation Based on Global Enhanced Graph Neural Network [J]. Computer Science, 2022, 49(9): 55-63.
[2] WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293.
[3] YAN Jia-dan, JIA Cai-yan. Text Classification Method Based on Information Fusion of Dual-graph Neural Network [J]. Computer Science, 2022, 49(8): 230-236.
[4] ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169.
[5] QI Xiu-xiu, WANG Jia-hao, LI Wen-xiong, ZHOU Fan. Fusion Algorithm for Matrix Completion Prediction Based on Probabilistic Meta-learning [J]. Computer Science, 2022, 49(7): 18-24.
[6] YANG Bing-xin, GUO Yan-rong, HAO Shi-jie, Hong Ri-chang. Application of Graph Neural Network Based on Data Augmentation and Model Ensemble in Depression Recognition [J]. Computer Science, 2022, 49(7): 57-63.
[7] HOU Xia-ye, CHEN Hai-yan, ZHANG Bing, YUAN Li-gang, JIA Yi-zhen. Active Metric Learning Based on Support Vector Machines [J]. Computer Science, 2022, 49(6A): 113-118.
[8] LIN Xi, CHEN Zi-zhuo, WANG Zhong-qing. Aspect-level Sentiment Classification Based on Imbalanced Data and Ensemble Learning [J]. Computer Science, 2022, 49(6A): 144-149.
[9] XIONG Zhong-min, SHU Gui-wen, GUO Huai-yu. Graph Neural Network Recommendation Model Integrating User Preferences [J]. Computer Science, 2022, 49(6): 165-171.
[10] DENG Zhao-yang, ZHONG Guo-qiang, WANG Dong. Text Classification Based on Attention Gated Graph Neural Network [J]. Computer Science, 2022, 49(6): 326-334.
[11] WEI Peng, MA Yu-liang, YUAN Ye, WU An-biao. Study on Temporal Influence Maximization Driven by User Behavior [J]. Computer Science, 2022, 49(6): 119-126.
[12] DONG Qi-da, WANG Zhe, WU Song-yang. Feature Fusion Framework Combining Attention Mechanism and Geometric Information [J]. Computer Science, 2022, 49(5): 129-134.
[13] YU Ai-xin, FENG Xiu-fang, SUN Jing-yu. Social Trust Recommendation Algorithm Combining Item Similarity [J]. Computer Science, 2022, 49(5): 144-151.
[14] LI Yong, WU Jing-peng, ZHANG Zhong-ying, ZHANG Qiang. Link Prediction for Node Featureless Networks Based on Faster Attention Mechanism [J]. Computer Science, 2022, 49(4): 43-48.
[15] CHANG Ya-wen, YANG Bo, GAO Yue-lin, HUANG Jing-yun. Modeling and Analysis of WeChat Official Account Information Dissemination Based on SEIR [J]. Computer Science, 2022, 49(4): 56-66.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!