Computer Science ›› 2024, Vol. 51 ›› Issue (5): 12-20.doi: 10.11896/jsjkx.230300172
• Discipline Frontier • Previous Articles Next Articles
WANG Gengrun
CLC Number:
[1]XIE L.Research on Information Investigation of Telecom Network Fraud [J].Journal of People's Public Security University of China(Science and Technology),2020,26(3):85-93. [2]ADOMAVICIUS G,TUZHILIN A.Toward the next generation of recommender systems:A survey of the state-of-the-art and possible extensions [J].IEEE Transactions on Knowledge and Data Engineering,2005,17(6):734-749. [3]LIU X Z,XIA T,YU Y Y,et al.Cross social media recommendation[C]//The International AAAI Conference on Web and Social Media.[S.l.]:AAAI,2016:1-10. [4]XING L,DENG K,WU H,et al.A Survey of Across Social Net-works User Identification [J].IEEE Access,2019,7:137472-137488. [5]ZAHRA K,AZAM F,BUTT W H,et al.User Identification on Social Networks Through Text Mining Techniques:A Syste-matic Literature Review[C]//International Conference on Information Science and Applications.Singapore:Springer,2019. [6]GOMAA W H,FAHMY A A.A Survey of Text Similarity Approaches [J].International Journal of Computer Applications,2013,68(13):13-18,. [7]XING L,DENG K K,WU H H,et al.Review of User Identification across Social Networks:The Complex Network Approach [J].Journal of University of Electronic Science and Technology of China,2020,49(6):905-917. [8] LUAN M M,ZHAO T,YANG X H,et al.A Survey of Cross Social Network User Identification at Home and Abroad [J].Journal of Qilu University of Technology,2020,34(4):55-60. [9]SHEN W,WANG J Y,LUO P,et al.Linking named entities in Tweets with knowledge base via user interest modeling[C]//Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.ACM,2013:68-76. [10]LIU S,WANG S,ZHU F,et al.HYDRA:Large-Scale socialidentity linkage via heterogeneous behavior modeling[C]//Proceedings of the 2014 ACM SIGMOD International Conference.on Management of Data.New York:ACM Press,2014:51-62. [11]MOHAMED A,QIAN K,ELHOSEINY M,et al.Social-STGCNN:A Social Spatio-Temporal Graph Convolutional Neural Network for Human Trajectory Prediction[C]//2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition(CVPR).IEEE,2020. [12]ZHOU F,LIU L,ZHANG K,et al.DeepLink:A Deep Learning Approach for User Identity Linkage[C]//IEEE INFOCOM 2018-IEEE Conference on Computer Communications.IEEE,1313-1321. [13]DENG K K,XING L,ZHENG L,et al.A User IdentificationAlgorithm Based on User Behavior Analysis in Social Networks [J].IEEE Access,2019,7:47114-47123. [14]ZAFARANI R,TANG L,LIU H.User identification across social media [J].ACM Transactions on Knowledge Discovery from Data,2015,10(2):1-30. [15]GANG H,SHA C.Implement Of Network User Virtual Identity Merging Based on Spark[C]//International Conference on Communication and Electronic Information Engineering(CEIE 2016).2017. [16]ZHOU F,GAO Q,TRAJCEVSKI G,et al.Trajectory-user lin-king via variational autoencoder[C]//Proceedings of the 27th International Joint Conference on Artificial Intelligence.Stockholm,Sweden,2018:3212-3218. [17]CHEN H C,XU Q,HUANG R Y,et al.User IdentificationAcross Social Networks Based on User Trajectory [J].Journal of Electronics & Information Technology,2018,40(11):2758-2764. [18]FU S,WANG G,XIA S,et al.A Multi-Granularity Representation Learning Framework for User Identification Across Social Networks[C]//2019 International Joint Conference on Rough Sets(IJCRS).Springer,2019. [19]XING L,DENG K K,WU H H,et al.Behavioral Habits-Based User Identification Across Social Networks [J].Symmetry,2019,11(9):1134. [20]JAMJUNTRA L,CHARTSUWAN P,WONGLIMSAMUT P,et al.Social network user identification[C]//2017 9th International Conference on Knowledge and Smart Technology(KST).IEEE,2017. [21]ZHAO D,NING Z,MING X,et al.An Improved User Identification Method Across Social Networks Via Tagging Behaviors[C]//2018 IEEE 30th International Conference on Tools with Artificial Intelligence(ICTAI).IEEE,2018. [22]GAO Q,ZHOU F,ZHANG K,et al.Identifying human mobility via trajectory embeddings[C]//Proceedings of the 26th International Joint Conference on Artificial Intelligence.Melbourne,Australia,2017:1689-1695. [23]ZHOU F,CHEN S,WU J,et al.Trajectory-User Linking via Graph Neural Network[C]//IEEE International Conference on Communications(ICC 2021).IEEE,2021. [24]ZHOU X,LIANG X,ZHANG H,et al.Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks [J].IEEE Transactions on Knowledge and Data Engineering,2016,28(2):411-424. [25]ZHANG W,LI Y,ZHANG J,et al.A User Trajectory Identification Model with Fusion of Spatio-Temporal Behavior and Social Relation [J].Chinese Journal of Computers,2021(11):44. [26]KONG X,ZHANG J,YU P S.Inferring anchor links acrossmultiple heterogeneous social networks[C]//ACM Interna-tional Conference on Information & Knowledge Management.ACM,2013. [27]YANG Y,ZHAN D C,WU Y F,et al.Multi-network UserIdentification via Graph-Aware Embedding[C]//2018 Pacific-Asia Conference on Knowledge Discovery and Data Mining.Springer,2018. [28]KOJIMA K,IKEDA K,TANI M.Short Paper:User Identification across Online Social Networks Based on Similarities among Distributions of Friends' Locations[C]//2019 IEEE Interna-tional Conference on Big Data(Big Data).IEEE,2019. [29]ZENG W,TANG R,WANG H,et al.User Identification Based on Integrating Multiple User Information across Online Social Networks [J].Security and Communication Networks,2021:1-14. [30]YING C X,CAI T L,LUO S J,et al.Do transformers really perform badly for graph representation?[C]//Advances in Neural Information Processing Systems 34.2021:28877-28888. [31]CHEN H,YIN H,SUN X,et al.Multi-level Graph Convolu-tional Networks for Cross-platform Anchor Link Prediction[C]//Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining.ACM,2020:1503-1511. [32]LIU Q,LI Y,DUAN H,et al.Knowledge Graph ConstructionTechniques [J].Journal of Computer Research and Development,2016,53(3):582-600. [33]WU X,JIANG T,ZHU Y,et al.Knowledge graph for china's genealogy [J].IEEE Transactions on Knowledge and Data Engineering,2021,35(1):634-646. [34]SUN Z,WANG C,HU W,et al.Knowledge Graph AlignmentNetwork with Gated Multi-Hop Neighborhood Aggregation [J].Proceedings of the AAAI Conference on Artificial Intelligence,2020,34(1):222-229. [35]LI J,WANG Z,XIAO Z,et al.Large scale instance matching via multiple indexes and candidate selection [J].Knowledge-Based Systems,2013,50:112-120. [36]LU W,WU C.Literature Review on Entity Linking [J].Journal of the China Society for Scientific and Technical Information,2015,34(1):105-112. [37]ZHENG Y,WANG L H,ZHANG R C,et al.GeoLife:managing and understanding your past life over maps[C]//Proceedings of the 9th International Conference on Mobile Data Management.IEEE Press,2008:211-212. [38]SANG J T,LU D Y,XU C S.Overlapped User-based Cross-network Analysis:Exploring Variety in Big Social Media Data [J].Chinese Science Bulletin,2014,59(36):3554-3560. [39]TAO F,LIU W R,LIU J H,et al.Digital Twin and Its Potential Application Exploring [J].Computer Integrated Manufacturing Systems,2018,24(1):4-21. [40]LI L,MIN Z.The Strategy of Mining Association Rule Based on Cloud Computing[C]//2011 International Conference on Business Computing and Global Informatization(BCGIN).IEEE,2011. [41]SUN Y,KAMEL M S,WONG A,et al.Cost-sensitive boosting for classification of imbalanced data[J].Pattern Recognition,2007,40(12):3358-3378. [42]PING R,ZHOU Y S,LI D.Cost sensitive random forest classifi-cation algorithm for highly unbalanced data [J].Pattern Recognition and Artificial Intelligence 2020,33(3):249-257. [43]LI T,SRIKUMAR V.Augmenting neural networks with first-order logic[C]//Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics.ACL,2019:102-113. [44]LV L Y.Link Prediction on Complex Networks [J].Journal of University of Electronic Science and Technology of China,2010,39(5):651-661. [45]LIN Y J,WU Y,LI H B.Internet Hirelings Semi-supervised Detection of Weibo Based on Affinity Propagation Algorithm [J].Netinfo Security,2022,22(3):85-96. |
[1] | SHAN Xiaohuan, SONG Rui, LI Haihai, SONG Baoyan. Event Recommendation Method with Multi-factor Feature Fusion in EBSN [J]. Computer Science, 2023, 50(7): 60-65. |
[2] | CAO Jinxin, XU Weizhong, JIN Di, DING Weiping. Survey of Community Discovery in Complex Networks [J]. Computer Science, 2023, 50(11A): 230100130-11. |
[3] | WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293. |
[4] | WEI Peng, MA Yu-liang, YUAN Ye, WU An-biao. Study on Temporal Influence Maximization Driven by User Behavior [J]. Computer Science, 2022, 49(6): 119-126. |
[5] | YU Ai-xin, FENG Xiu-fang, SUN Jing-yu. Social Trust Recommendation Algorithm Combining Item Similarity [J]. Computer Science, 2022, 49(5): 144-151. |
[6] | CHANG Ya-wen, YANG Bo, GAO Yue-lin, HUANG Jing-yun. Modeling and Analysis of WeChat Official Account Information Dissemination Based on SEIR [J]. Computer Science, 2022, 49(4): 56-66. |
[7] | ZUO Yuan-lin, GONG Yue-jiao, CHEN Wei-neng. Budget-aware Influence Maximization in Social Networks [J]. Computer Science, 2022, 49(4): 100-109. |
[8] | GUO Lei, MA Ting-huai. Friend Closeness Based User Matching [J]. Computer Science, 2022, 49(3): 113-120. |
[9] | SHAO Yu, CHEN Ling, LIU Wei. Maximum Likelihood-based Method for Locating Source of Negative Influence Spreading Under Independent Cascade Model [J]. Computer Science, 2022, 49(2): 204-215. |
[10] | SONG Xin-yue, SHUAI Tian-ping, CHEN Bin. Misinformation Correction Maximization Problem with Edge Addition in Social Networks [J]. Computer Science, 2022, 49(11): 316-325. |
[11] | WANG Jian, WANG Yu-cui, HUANG Meng-jie. False Information in Social Networks:Definition,Detection and Control [J]. Computer Science, 2021, 48(8): 263-277. |
[12] | TAN Qi, ZHANG Feng-li, WANG Ting, WANG Rui-jin, ZHOU Shi-jie. Social Network User Influence Evaluation Algorithm Integrating Structure Centrality [J]. Computer Science, 2021, 48(7): 124-129. |
[13] | ZHANG Ren-zhi, ZHU Yan. Malicious User Detection Method for Social Network Based on Active Learning [J]. Computer Science, 2021, 48(6): 332-337. |
[14] | BAO Zhi-qiang, CHEN Wei-dong. Rumor Source Detection in Social Networks via Maximum-a-Posteriori Estimation [J]. Computer Science, 2021, 48(4): 243-248. |
[15] | ZHANG Shao-jie, LU Xu-dong, GUO Wei, WANG Shi-peng, HE Wei. Prevention of Dishonest Behavior in Supply-Demand Matching [J]. Computer Science, 2021, 48(4): 303-308. |
|