JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2019, Vol. 54 ›› Issue (9): 105-113.doi: 10.6040/j.issn.1671-9352.1.2018.115

Previous Articles     Next Articles

Social network user identity linkage model based on comprehensive information

YANG Ya-ru*, WANG Yong-qing, ZHANG Zhi-bin, LIU Yue, CHENG Xue-qi   

  1. Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China
  • Online:2019-09-20 Published:2019-07-30

Abstract: With the increasing popularity of social media sites, users prefer to join multiple online social networks, how to associate multiple user identities in a social network as a new job in social media is of great significance. This paper studies a representative user identity linkage model and proposes a user identity linkage model based on comprehensive information(BiALP). The model learns the internal structure information, attribute information and content information of the network through the node expression method. It is characterized by the node representation of the source network and the target network, and is based on the associated user pairs. With tagged data, the relationship between the source network and the target network is learned through a binary supervised learning manner. A large number of experiments have shown that the BiALP model has a significant improvement(35%)compared to other representative user identity linkage models.

Key words: user linkage, network embedding, supervised learning

CLC Number: 

  • TP391
[1] MANIKONDA L, MEDURI V V, KAMBHAMPATI S. Tweeting the mind and instagramming the heart: exploring differentiated content sharing on social media[C] //Tenth International AAAI Conference on Web and Social Media. Cologne: AAAI Press, 2016: 639-642.
[2] CARMAGNOLA F, CENA F. User identification for cross-system personalisation[J]. Information Sciences, 2009, 179(1/2):16-32.
[3] DENG Z, SANG J, XU C. Personalized video recommendation based on cross-platform user modeling[C] // 2013 IEEE International Conference on Multimedia and Expo(ICME). San Jose: IEEE, 2013: 1-6.
[4] YAN M, SANG J, MEI T, et al. Friend transfer: cold-start friend recommendation with cross-platform transfer learning of social knowledge[C] // 2013 IEEE International Conference on Multimedia and Expo(ICME). San Jose: IEEE, 2013: 1-6.
[5] KUMAR S, ZAFARANI R, LIU H. Understanding user migration patterns in social media[C] // AAAI. San Francisco: AI Access Foundation, 2011, 11:8-11.
[6] SHU K, WANG S H, TANG J L, et al. User identity linkage across online social networks[J]. ACM SIGKDD Explorations Newsletter, 2017, 18(2):5-17.
[7] ZAFARANI R, LIU H. Connecting users across social media sites: a behavioral-modeling approach[C] // Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Chicago: ACM, 2013: 41-49.
[8] MAN T, SHEN H, LIU S, et al. Predict anchor links across social networks via an embedding approach[C] // IJCAI. New York: International Joint Conferences on Artificial Intelligence, 2016, 16:1823-1829.
[9] LIU S, WANG S, ZHU F, et al. Hydra: large-scale social identity linkage via heterogeneous behavior modeling[C] // Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data. Snowbird: ACM, 2014: 51-62.
[10] RONG X. word2vec parameter learning explained[J]. arXiv preprint arXiv:1411.2738, 2014.
[11] KLEMA V, LAUB A. The singular value decomposition: its computation and some applications[J]. IEEE Transactions on Automatic Control, 1980, 25(2):164-176.
[12] CUI Y, PEI J, TANG G T, et al. Finding email correspondents in online social networks[J]. World Wide Web, 2013, 16(2):195-218.
[13] TANG J, QU M, WANG M, et al. Line: large-scale information network embedding[C] // Proceedings of the 24th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee. Florence: Association for Computing Machinery, 2015: 1067-1077.
[14] RUCK D W, ROGERS S K, KABRISKY M, et al. The multilayer perceptron as an approximation to a Bayes optimal discriminant function[J]. IEEE Transactions on Neural Networks, 1990, 1(4):296-298.
[15] KONG X, ZHANG J, YU P S. Inferring anchor links across multiple heterogeneous social networks[C] // Proceedings of the 22nd ACM International Conference on Information & Knowledge Management. San Francisco: ACM, 2013: 179-188.
[1] ZHANG Peng, WANG Su-ge, LI De-yu, WANG Jie. A semi-supervised spam review classification method based on heuristic rules [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(7): 44-51.
[2] HUANG Tian-yi, ZHU William. Cost-sensitive feature selection via manifold learning [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 91-96.
[3] SU Feng-long, XIE Qing-hua, HUANG Qing-quan, QIU Ji-yuan, YUE Zhen-jun. Semi-supervised method for attribute extraction based on transductive learning [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(3): 111-115.
[4] DU Hong-le, ZHANG Yan, ZHANG Lin. Intrusion detection on imbalanced dataset [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(11): 50-57.
[5] CHEN Ya-dong, HONG Yu, YANG Xue-rong, WANG Xiao-bin, YAO Jian-min, ZHU Qiao-ming. Automatic target identification in frame semantic parsing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(07): 45-53.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] SHI Ai-ling1, MA Ming2*, ZHENG Ying2. Customer lifetime value and property with #br# homogeneous Poisson response[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(03): 96 -100 .
[2] TIAN Xue-gang, WANG Shao-ying. Solutions to the operator equation AXB=C[J]. J4, 2010, 45(6): 74 -80 .
[3] PANG Guan-song, ZHANG Li-sha, JIANG Sheng-yi*, KUANG Li-min, WU Mei-ling. A multi-level clustering approach based on noun phrases for search results[J]. J4, 2010, 45(7): 39 -44 .
[4] TANG Feng-qin1, BAI Jian-ming2. The precise large deviations for a risk model with extended negatively upper orthant dependent claim  sizes[J]. J4, 2013, 48(1): 100 -106 .
[5] QIU Tao-rong, WANG Lu, XIONG Shu-jie, BAI Xiao-ming. A granular computing approach for knowledge hiding[J]. J4, 2010, 45(7): 60 -64 .
[6] XUE Qiu-fang1,2, GAO Xing-bao1*, LIU Xiao-guang1. Several equivalent conditions for H-matrix based on the extrapolated GaussSeidel iterative method[J]. J4, 2013, 48(4): 65 -71 .
[7] SUN Xiao-ting1, JIN Lan2*. Application of DOSY in oligosaccharide mixture analysis[J]. J4, 2013, 48(1): 43 -45 .
[8] MAO Ai-qin1,2, YANG Ming-jun2, 3, YU Hai-yun2, ZHANG Pin1, PAN Ren-ming1*. Study on thermal decomposition mechanism of  pentafluoroethane fire extinguishing agent[J]. J4, 2013, 48(1): 51 -55 .
[9] REN Min1,2, ZHANG Guang-hui1. Absorbing probabilities of random walks in an independent random  environment convergence in distribution on the half-line[J]. J4, 2013, 48(1): 93 -99 .
[10] ZHAO Jun1, ZHAO Jing2, FAN Ting-jun1*, YUAN Wen-peng1,3, ZHANG Zheng1, CONG Ri-shan1. Purification and anti-tumor activity examination of water-soluble asterosaponin from Asterias rollestoni Bell[J]. J4, 2013, 48(1): 30 -35 .