JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2019, Vol. 54 ›› Issue (3): 10-17, 27.doi: 10.6040/j.issn.1671-9352.2.2018.084
• • Previous Articles Next Articles
Xiao-jie XIE1,2(),Ying LIANG1,*(
),Xiang-xiang DONG1,2
CLC Number:
1 | ACQUISTI A, GROSS R. Imagined communities: awareness, information sharing, and privacy on the facebook[M]// ACQUISTI A, GROSS R. eds. Privacy Enhancing Technologies. Berlin: Springer, 2006: 36-58. |
2 | LI Xiaoxue, CAO Yannan, SHANG Yanmin, et al. Inferring user profiles in online social networks based on convolutional neural network[C]// Proceedings of International Conference on Knowledge Science, Engineering and Management(KSEM). New York: Springer, 2017: 274-286. |
3 | XU W H, ZHOU X, LI L. Inferring privacy information via social relations[C]//2008 IEEE 24th International Conference on Data Engineering Workshop. Mexico: ICDE, 2008: 525-530. |
4 | LINDAMOOD J, HEATHERLY R, KANTARCIOGLU M, et al. Inferring private information using social network data[C]// International Conference on World Wide Web. New York: ACM, 2008. |
5 | JIA Jinyuan, WANG Binghui, ZHANG Le, et al. AttriInfer: inferring user attributes in online social networks using Markov random fields[C]// Proceedings of International World Wide Web Conferences(WWW). New York: ACM, 2017: 1561-1569. |
6 | DONG Y X, TANG J, WU S, et al. Link prediction and recommendation across heterogeneous social networks[C]// IEEE International Conference on Data Mining. New York: IEEE, 2013. |
7 | CHAUDHARI G, AVADHANULA V, SARAWAGI S. A few good predictions: selective node labeling in a social network[C]// ACM International Conference on Web Search & Data Mining.[s.l.]: ACM, 2014. |
8 | ELENA Z, LISE G. To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles[C]// Proceedings of International World Wide Web Conferences(WWW). New York: ACM, 2009: 531-540. |
9 | LARS B, ERIC S, CAMERON M. Find me if you can: improving geographical prediction with social and spatial proximity[C] // Proceedings of International World Wide Web Conferences(WWW). North Carolina: ACM, 2010: 61-70. |
10 | LI Rui, WANG Chi, CHANG Chenchuan. User profiling in an ego network: co-profiling attributes and relationships[C]// Proceedings of International World Wide Web Conferences(WWW). New Youk: ACM, 2014: 819-830. |
11 |
DOUGNON R Y , FOURNIER-VIGER P , LIN J C W , et al. Inferring social network user profiles using a partial social graph[J]. Journal of Intelligent Information Systems, 2016, 47 (2): 313- 344.
doi: 10.1007/s10844-016-0402-y |
12 | WONG R K, VIDYALAKSHMI B S. Privacy leakage via attribute inference in directed social networks[C]// Proceedings of International Conference on Information and Communications Security(ICICS). Berlin: Springer. 2016: 333-346. |
13 |
胡开先, 梁英, 许洪波, 等. 一种社会网络用户身份特征识别方法[J]. 计算机研究与发展, 2016, 53 (11): 2630- 2644.
doi: 10.7544/issn1000-1239.2016.20150219 |
HU Kaixian , LIANG Yin , XU Hongbo , et al. A method for social network user identity feature recognition[J]. Journal of Computer Research and Development, 2016, 53 (11): 2630- 2644.
doi: 10.7544/issn1000-1239.2016.20150219 |
|
14 | GONG Zhenqiang, LIU Bin. You are who you know and how you behave: attribute inference attacks via users' social friends and behaviors[J]. arXiv: 1606.05893. https: //arxiv.org/abs/1606.05893 |
15 | ABDELBERI C, GERGELY A, MOHAMED A K. You are what you like! Information leakage through users' interests[C]// Proceedings of ISOC Network and Distributed System Security Symposium(NDSS). San Diego: [s.n.], 2012. |
16 | ALAN M, BIMAL V, KRISHNA P, et al. You are who you know: inferring user profiles in online social networks[C]// Proceedings of ACM International Conference on Web Search and Data Mining(WSDM). New York: ACM, 2010: 251-260. |
17 | MACSKASSY S A , PROVOST F . Classification in networked data: a toolkit and a univariate case study[J]. Journal of Machine Learning Research, 2007, 8 (3): 1- 41. |
18 | YOON K. Convolutional neural networks for sentence classification[C] // Proceedings of Conference on Empirical Methods in Natural Language Processing(EMNLP). Doha: ACL, 2014: 1746-1751. |
[1] | SUI Yun-xian, LIU Yong. Mining algorithm of E-burt structural hole based on two-step neighbor [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(9): 59-68. |
[2] | ZHANG Zhong-jun, ZHANG Wen-juan, YU Lai-hang, LI Run-chuan. A community division method based on network distance and content similarity in micro-blog social network [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(7): 97-103. |
[3] | KANG Hai-yan, MA Yue-lei. Survey on application of data mining via differential privacy [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 16-23. |
[4] | DENG Xiao-fang, ZHONG Yuan-sheng, L(¨overU)Lin-yuan, WANG Ming-wen, XIONG Nai-xue. Mass diffusion on coupled social networks [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 51-59. |
[5] | LIU Xin, XU Qiu-liang, ZHANG Bo. Cooperative group signature scheme with controllable linkability [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 18-35. |
[6] | ZHU Sheng, ZHOU Bin, ZHU Xiang. EIP: discovering influential bloggers by user similarity and topic timeliness [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 113-120. |
[7] | GUO Hua-long, REN Xue-fang, ZHANG Ling. Relationships between dynamic data mining and P-augmented matrix [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(8): 105-110. |
[8] | CAI Hong-yun, MA Xiao-xue. Access control based on relationship strength for online social network [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(7): 90-97. |
[9] | WAN Zhong-ying, WANG Ming-wen, ZUO Jia-li, WAN Jian-yi. Feature selection combined with the global and local information(GLFS) [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(5): 87-93. |
[10] | REN Xue-fang, ZHANG Ling. Perturbation theorems of inverse P-sets and perturbation-based data mining [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(12): 54-60. |
[11] | ZHANG Shao-qun, WEI Jing-jing, LIAO Xiang-wen, JIAN Si-yuan, CHEN Guo-long. Emotional contagion in Twitter [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(1): 71-76. |
[12] | ZHANG Ling, REN Xue-fang. Surplus-deficient theorem of cardinal number and data internal-outer mining-separation [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(08): 90-94. |
[13] | MA Cheng-long, JIANG Ya-song, LI Yan-ling, ZHANG Yan, YAN Yong-hong. Short text classification based on word embedding similarity [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(12): 18-22. |
[14] | ZHENG Yan, PANG Lin, BI Hui, LIU Wei, CHENG Gong. Feature selection algorithm based on sentiment topic model [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(11): 74-81. |
[15] | LI Qi1,2, MA Jun1,2*. Person′s name disambiguation based on person related social communities [J]. J4, 2012, 47(3): 33-37. |
|