Computer Science ›› 2021, Vol. 48 ›› Issue (7): 124-129.doi: 10.11896/jsjkx.200600096
• Database & Big Data & Data Science • Previous Articles Next Articles
TAN Qi, ZHANG Feng-li, WANG Ting, WANG Rui-jin, ZHOU Shi-jie
CLC Number:
[1]ILIE V,TUREL O.Manipulating user resistance to large-scale information systems through influence tactics[J].Information &Management,2019,57(3):103178. [2]ZAREIE A,SHEIKHAHMADI A,JALILI M.Identification of influential users in social networks based on users’ interest[J].Information Sciences,2019,493:217-231. [3]HUANG X Y,YANG A Z,LIU X Y,et al.An Improved In-fluence assessment algorithm for Weibo users[J].Computer Engineering,2019,45(12):294-299. [4]JU C H,ZHAO K D,BAO F G.Influence Strength Calculation Model of Social Network Users integrating Closeness Centrality and Credit[J].Chinese Journal of Intelligence,2019,38(2):170-177. [5]CHENG S,JIANG C,REN K.The Influence of the Central Path Media Blog Post Information Characteristics on User Behavior[C]//Institute of Management Science and Industrial Enginee-ring:Computer Science and Electronic Technology International Society.2019:8. [6]WEI J M,HE H.Research on user Behavior and Influence Assessment Algorithm in Social Network[J].Intelligent Computer and Application,2019,9(2):162-167. [7]ZHANG C,TANG K,PENG Y B.Fuzzy Comprehensive Evalua-tion of social Network Users’ Influence[J].Computer System Application,2017,26(12):18-24. [8]WANG Z F,ZHU J Y,ZHENG Z Y,et al.Influence analysis of Users in Weibo Community based on RC Model[J].Computer Science,2017,44(3):254-258,282. [9]XING Y F,WANG X W,HAN X W,et al.Research on in-fluence of network nodes in new media environment based on information entropy-case study of WeChat public account[J].Books and Intelligence Work,2018,62(5):76-86. [10]ZHANG J D,YANG Y.Research on influence MeasurementModel of Mobile Social Network Users based on interactive behavior and emotional tendency[J].Intelligence Theory and Practice,2019,42(1):112. [11]HAN Z M,MAO R,ZHENG C Y,et al.An effective dynamic network Node influence model[J].Computer Application Research,2019(7):1960-1964. [12]PAGE L,BRIN S,MOTWANI R,et al.The pagerank citation ranking:Bringing order to the web[R].Stanford InfoLab,1999. [13]KWAK H,LEE C,PARK H,et al.What Is Twitter,a SocialNetwork or a News Media?[C]//Proceedings of the 19th International Conference on World Wide Web.2010. [14]SU S Q,YANG K,ZHANG N.Comparative Study of Leader-Rank and PageRank Algorithms[J].Information Technology,2015(4):8-11. [15]WEI J D,QIN X Z,JIA Z H,et al.User Influence Evaluation Model based on user behavior and Structural hole[J].Modern Electronic Technology,2019(5):39. [16]WANG J,YU W,HU Y H,et al.Social Network InfluenceMaximization Algorithm based on 3-Layer Centrality[J].Computer Science,2014,41(1):59-63. [17]CHEN X L.Research on Social Network Influence Maximization Algorithm and Its Propagation Model[D].Harbin:Harbin Engineering University,2016:20-22. [18]YANG S X,LIANG W,ZHU K L.Influence measurementmethod of nodes in complex network based on three-level neighbors [J].Journal of Electronics and Information Technology,2020,42. [19]BACHA R E,ZIN T T.A Survey on Influence and Information Diffusion in Twitter Using Big Data Analytics[C]//Internatio-nal Conference on Big Data Analysis and Deep Learning Applications.Singapore:Springer,2018:39-47. [20]YU J.Empirical Analysis on the Characteristics of Users’ in-fluence in the Process of Microblog communication [J].Journal of Intelligence,2013(8):61-65. [21]LOU S,ZHOU M,QU Q.Analysis of User Influence of Social Investment Platform-Taking Snowball Network as an Example[J].Service Science and Mangement,2019,8(6):251-262. [22]CAO Q,SHEN H W,CEN K T,et al.DeepHawkes:Bridgingthe Gap between Prediction and Understanding of Information Cascades[C]//CIKM 2017.2017:1149-1158. [23]ZHANG N,RAO J,ZHANG S Q,et al.Power-law distribution phenomenon of sina weibo forwarding number[J].Computer Age,2015(3):33-35. [24]GYONGYI Z,GARCIAMOLINA H,PEDERSEN J.Combating web spam with trustrank[C]//Proceedings of the 2004 International Conference on Very Large Data Bases (VLDB).Toronto,2004:576-587. [25]ZHAO J Q,GUI X L,TIAN F.A New Method of Identifying Influential Users in the Micro-Blog Networks[J].IEEE Access,2017,5:3008-3015. |
[1] | CHEN Yong-quan, JIANG Ying. Analysis Method of APP User Behavior Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(8): 78-85. |
[2] | WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293. |
[3] | WEI Peng, MA Yu-liang, YUAN Ye, WU An-biao. Study on Temporal Influence Maximization Driven by User Behavior [J]. Computer Science, 2022, 49(6): 119-126. |
[4] | YU Ai-xin, FENG Xiu-fang, SUN Jing-yu. Social Trust Recommendation Algorithm Combining Item Similarity [J]. Computer Science, 2022, 49(5): 144-151. |
[5] | CHANG Ya-wen, YANG Bo, GAO Yue-lin, HUANG Jing-yun. Modeling and Analysis of WeChat Official Account Information Dissemination Based on SEIR [J]. Computer Science, 2022, 49(4): 56-66. |
[6] | ZUO Yuan-lin, GONG Yue-jiao, CHEN Wei-neng. Budget-aware Influence Maximization in Social Networks [J]. Computer Science, 2022, 49(4): 100-109. |
[7] | GUO Lei, MA Ting-huai. Friend Closeness Based User Matching [J]. Computer Science, 2022, 49(3): 113-120. |
[8] | SHAO Yu, CHEN Ling, LIU Wei. Maximum Likelihood-based Method for Locating Source of Negative Influence Spreading Under Independent Cascade Model [J]. Computer Science, 2022, 49(2): 204-215. |
[9] | WANG Jian, WANG Yu-cui, HUANG Meng-jie. False Information in Social Networks:Definition,Detection and Control [J]. Computer Science, 2021, 48(8): 263-277. |
[10] | ZHANG Ren-zhi, ZHU Yan. Malicious User Detection Method for Social Network Based on Active Learning [J]. Computer Science, 2021, 48(6): 332-337. |
[11] | BAO Zhi-qiang, CHEN Wei-dong. Rumor Source Detection in Social Networks via Maximum-a-Posteriori Estimation [J]. Computer Science, 2021, 48(4): 243-248. |
[12] | ZHANG Shao-jie, LU Xu-dong, GUO Wei, WANG Shi-peng, HE Wei. Prevention of Dishonest Behavior in Supply-Demand Matching [J]. Computer Science, 2021, 48(4): 303-308. |
[13] | ZHANG Hao-chen, CAI Ying, XIA Hong-ke. Delivery Probability Based Routing Algorithm for Vehicular Social Network [J]. Computer Science, 2021, 48(3): 289-294. |
[14] | YUAN De-yu, CHEN Shi-cong, GAO Jian, WANG Xiao-juan. Intervention Algorithm for Distorted Information in Online Social Networks Based on Stackelberg Game [J]. Computer Science, 2021, 48(3): 313-319. |
[15] | TAN Qi, ZHANG Feng-li, ZHANG Zhi-yang, CHEN Xue-qin. Modeling Methods of Social Network User Influence [J]. Computer Science, 2021, 48(2): 76-86. |
|