User Credibility Assessment Based on Trust Propagation in Microblog
Title | User Credibility Assessment Based on Trust Propagation in Microblog |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Wang, W., Xuan, S., Yang, W., Chen, Y. |
Conference Name | 2019 Computing, Communications and IoT Applications (ComComAp) |
Date Published | Oct. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-7281-1973-1 |
Keywords | Clustering algorithms, Computing Theory, false social relationships, Fans, feature extraction, graph theory, Human Behavior, human factors, low trusted user, malicious users, Manuals, microblog, Microblog platform, microblog user credibility evaluation algorithm, Network topology, online social network, online social networking platform, optimisation, pruning algorithm, pubcrawl, seed node selection algorithm, Social network services, social networking (online), Trust, trust propagation, Trusted Computing, trustworthiness-based user credibility evaluation algorithm, two-way propagation trust scoring, Uniform resource locators, user credibility assessment, user social relationship graph |
Abstract | Nowadays, Microblog has become an important online social networking platform, and a large number of users share information through Microblog. Many malicious users have released various false news driven by various interests, which seriously affects the availability of Microblog platform. Therefore, the evaluation of Microblog user credibility has become an important research issue. This paper proposes a microblog user credibility evaluation algorithm based on trust propagation. In view of the high consumption and low precision caused by malicious users' attacking algorithms and manual selection of seed sets by establishing false social relationships, this paper proposes two optimization strategies: pruning algorithm based on social activity and similarity and based on The seed node selection algorithm of clustering. The pruning algorithm can trim off the attack edges established by malicious users and normal users. The seed node selection algorithm can efficiently select the highly available seed node set, and finally use the user social relationship graph to perform the two-way propagation trust scoring, so that the low trusted user has a lower trusted score and thus identifies the malicious user. The related experiments verify the effectiveness of the trustworthiness-based user credibility evaluation algorithm in the evaluation of Microblog user credibility. |
URL | https://ieeexplore.ieee.org/document/9018752 |
DOI | 10.1109/ComComAp46287.2019.9018752 |
Citation Key | wang_user_2019 |
- online social network
- user social relationship graph
- user credibility assessment
- Uniform resource locators
- two-way propagation trust scoring
- trustworthiness-based user credibility evaluation algorithm
- Trusted Computing
- trust propagation
- trust
- social networking (online)
- Social network services
- seed node selection algorithm
- pubcrawl
- pruning algorithm
- optimisation
- online social networking platform
- Clustering algorithms
- network topology
- microblog user credibility evaluation algorithm
- Microblog platform
- microblog
- Manuals
- malicious users
- low trusted user
- Human Factors
- Human behavior
- graph theory
- feature extraction
- Fans
- false social relationships
- Computing Theory