Computer Science ›› 2018, Vol. 45 ›› Issue (6A): 433-436.

• Big Date & Date Mining • Previous Articles     Next Articles

Efficient Friend Recommendation Scheme for Social Networks

CHENG Hong-bing1,WANG Ke2,LI Bing2,QIAN Man-yun1   

  1. College of Computer Science &Technology,Zhejiang University of Technology,Hangzhou 310023,China1
    Jinhua Branch of Zhejiang Power Company,National Grid,Jinhua,Zhejiang 321000,China2
  • Online:2018-06-20 Published:2018-08-03

Abstract: With the rapid development of modern network technology,human society has entered the era of information.An increasing number of people prefer to talk and make friends with others through social networks.Besides the people or events which users initiatively focus on,social network will also recommend alternative users.However,most of the alternative users are the promotion of social networks.In this paper,for the accuracy and reliability of social networks recommendation,a new scheme based on tag matching was proposed.First,each word in the corpus is trained by Word2Vec,and then a word vectors space can be obtained and the similarity among words can be obtained by using the cosine similarity.Secondly,through the similarity comparison experiments,this paper chose an appropriate similarity value as the threshold to judge whether two words are similar.Finally,the similarity threshold was applied to the matching algorithm.The simulation experiments show that the recommend users are relatively reliable and accurate.

Key words: Friend recommendation, Similarity degree computing, Social networks, Word2Vec

CLC Number: 

  • TP393.0
[1]YIN Z,GUPTA M,WENINGER T,et al.LINKREC:a unified framework for link recommendation with user attributes and graph structure[C]∥International Conference on World Wide Web(WWW 2010).Raleigh,North Carolina,USA,DBLP,2010:1211-1212.
[2]YANG S H,LONG B,SMOLA A,et al.Like like alike:joint friendship and interest propagation in social networks[C]∥International Conference on World Wide Web.2011:537-546.
[3]GONG N Z,TALWALKAR A,MACKEY L,et al.Jointly Predicting Links and Inferring Attributes using a Social-Attribute Network (SAN)[C]∥The 6th SNA-KDD Workshop(SNA-KDD’12).Beijing,China,2012.
[4]WANG G,LIU Q,LI F,et al.Outsourcing privacy-preserving social networks to a cloud[C]∥IEEE INFOCOM.IEEE,2013:2886-2894.
[5]SHISHODIA M S,JAIN S,TRIPATHY B K.GASNA:greedy algorithm for social network anonymization[C]∥IEEE/ACM International Conference on Advances in Social Networks Anal-ysis and Mining.IEEE,2013:1161-1166.
[6]KHALID O,KHAN M U S,KHAN S U,et al.OmniSuggest:A Ubiquitous Cloud-Based Context-Aware Recommendation System for Mobile Social Networks[J].IEEE Transactions on Ser-vices Computing,2014,7(3):401-414.
[7]ZOU J,FEKRI F.On top-N recommendation using implicit user preference propagation over social networks[C]∥IEEE International Conference on Communications.IEEE,2014:3919-3924.
[8]李永凯,刘树波,杨召唤,等.机会网络中用户属性隐私安全的高效协作者资料匹配协议[J].通信学报,2015,36(12):163-171.
[9]梁俊杰,孙阳征.基于PH-Tree多属性索引树的朋友推荐算法[J].计算机科学,2015,42(4):156-159.
[10]LI F,WANG H,NIU B,et al.A practical group matching scheme for privacy-aware users in mobile social networks[C]∥Wireless Communications and NETWORKING Conference.IEEE,2016.
[11]LI M,NA R,QIAN Q,et al.SPFM:Scalable and Privacy-Preserving Friend Matching in Mobile Cloud[J].IEEE Internet of Things Journal,2017,4(2):583-591.
[12]GUO L,ZHANG C,FANG Y.A Trust-Based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks[J].IEEE Transactions on Dependable & Secure Computing,2015,12(4):413-427.
[13]HUANG S,ZHANG J,DAN S,et al.Two-Stage Friend Recommendation Based on Network Alignment and Series Expansion of Probabilistic Topic Model[J].IEEE Transactions on Multimedia,2017,19(6):1314-1326.
[14]HINTON G.Learning distributed representations of concepts [C]∥Eighth Annual Conference of the Cognitive Science Society.1986:1-12.
[15]BLEI D M,NG A Y,JORDAN M I.Latent dirichlet allocation[J].J Machine Learning Research Archive,2003,3:993-1022.
[1] XIONG Luo-geng, ZHENG Shang, ZOU Hai-tao, YU Hua-long, GAO Shang. Software Self-admitted Technical Debt Identification with Bidirectional Gate Recurrent Unit and Attention Mechanism [J]. Computer Science, 2022, 49(7): 212-219.
[2] WEI Peng, MA Yu-liang, YUAN Ye, WU An-biao. Study on Temporal Influence Maximization Driven by User Behavior [J]. Computer Science, 2022, 49(6): 119-126.
[3] GUO Lei, MA Ting-huai. Friend Closeness Based User Matching [J]. Computer Science, 2022, 49(3): 113-120.
[4] SHAO Yu, CHEN Ling, LIU Wei. Maximum Likelihood-based Method for Locating Source of Negative Influence Spreading Under Independent Cascade Model [J]. Computer Science, 2022, 49(2): 204-215.
[5] ZHANG Shao-jie, LU Xu-dong, GUO Wei, WANG Shi-peng, HE Wei. Prevention of Dishonest Behavior in Supply-Demand Matching [J]. Computer Science, 2021, 48(4): 303-308.
[6] YUAN De-yu, CHEN Shi-cong, GAO Jian, WANG Xiao-juan. Intervention Algorithm for Distorted Information in Online Social Networks Based on Stackelberg Game [J]. Computer Science, 2021, 48(3): 313-319.
[7] MA Li-bo, QIN Xiao-lin. Topic-Location-Category Aware Point-of-interest Recommendation [J]. Computer Science, 2020, 47(9): 81-87.
[8] ZHANG Hao-yang and ZHOU Liang. Application of Improved GHSOM Algorithm in Civil Aviation Regulation Knowledge Map Construction [J]. Computer Science, 2020, 47(6A): 429-435.
[9] LIANG Jun-bin, ZHANG Min, JIANG Chan. Research Progress of Social Sensor Cloud Security [J]. Computer Science, 2020, 47(6): 276-283.
[10] WU Lei,YUE Feng,WANG Han-ru,WANG Gang. Academic Paper Recommendation Method Combined with Researcher Tag [J]. Computer Science, 2020, 47(2): 51-57.
[11] GU Qiu-yang, JU Chun-hua, WU Gong-xing. Social Network Information Recommendation Model Combining Deep Autoencoder and Network Representation Learning [J]. Computer Science, 2020, 47(11): 101-112.
[12] LIU Yu-dong, SUN Hao, JIANG Yun-cheng. Personalized Microblog Recommendation Model Integrating Content Similarity and Multi-feature Computing [J]. Computer Science, 2020, 47(10): 97-101.
[13] ZHANG Zheng, WANG Hong-zhi, DING Xiao-ou, LI Jian-zhong, GAO Hong. Identification of Same User in Social Networks [J]. Computer Science, 2019, 46(9): 93-98.
[14] LV Zhi-quan, LI Hao, ZHANG Zong-fu, ZHANG Min. Topic-based Re-identification for Anonymous Users in Social Network [J]. Computer Science, 2019, 46(6): 143-147.
[15] YUAN De-yu, GAO Jian, YE Meng-xi, WANG Xiao-juan,. Malicious Information Source Locating Algorithm Based on Topological Extension in Online Social Network [J]. Computer Science, 2019, 46(5): 129-134.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!