JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE) ›› 2016, Vol. 46 ›› Issue (5): 7-12.doi: 10.6040/j.issn.1672-3961.1.2016.257

Previous Articles     Next Articles

Evaluation of microblog users' credibility based on HITS algorithm

WU Shufang1,2, XU Jianmin3 *   

  1. 1. College of Management and Economics, Tianjin University, Tianjin 300072, China;
    2. College of Management, Hebei University, Baoding 071000, Hebei, China;
    3.School of Computer Science and Technology, Hebei University, Baoding 071000, Hebei, China
  • Received:2016-03-31 Online:2016-10-20 Published:2016-03-31

Abstract: Based on Sina-Microblog and HITS(hyperlink-induced topic search)algorithm, a new user's credibility algorithm that merged user interactions and blog contents was putted forward. The new algorithm firstly constructed two directed connection graphs based on user interactions and blog contents respectively, where nodes represented users and arcs embodied the direction relationship between users. Authority and hub of these two connected graphs was computed. The fusion authority was adopted as measurement to evaluate user's credibility. The data collected from Sina-Microblog as test set was used to conduct experiments. Threshold of credibility was obtained by repeated training, and then credibility curves of different algorithms were drawn to verify the feasibility and effectiveness of the new algorithm.

Key words: HITS algorithm, interaction, credibility, blog, microblog users

CLC Number: 

  • TP391
[1] SONG J, LEE S, KIM J. Spam filtering in Twitter using sender-receiver relationship[M]. Berlin, German:Springer, 2006:301-317.
[2] 王越, 张剑金, 刘芳芳. 一种多特征微博僵尸粉检测方法与实现[J]. 中国科技论文, 2014, 9(1):81-86. WANG Yue, ZHANG Jianjin, LIU Fangfang. Detection of micro-blog zombie fans based on multi-features[J]. China Science Paper, 2014, 9(1):81-86.
[3] 刘晓飞. 基于链接分析的微博用户可信度研究[D]. 兰州:兰州交通大学, 2015. LIU Xiaofei. Research on credibility of microblog users based on link analysis[D]. Lanzhou:Lanzhou Jiaotong University, 2015.
[4] 蒋盛益, 陈东沂, 庞观松,等. 微博信息可信度分析研究综述[J]. 图书情报工作, 2013, 57(12):136-142. JIANG Shengyi, CHEN Dongyi, PANG Guansong, et al. A review of micro-blog information reliability analysis[J]. Library and Information Service, 2013, 57(12):136-142.
[5] 毛佳昕, 刘奕群, 张敏,等. 基于用户交互行为的微博用户社会影响力分析[J]. 计算机学报, 2014, 37(4):791-880. MAO Jiaxin, LIU Yiqun, ZHANG Min, et al. Social influence analysis for micro-blog user based on user behavior[J]. Chinese Journal of Computers, 2014, 37(4):791-880.
[6] Wikipedia Inc. Credibility[EB/OL].(2013-01-20)[2015-01-20].http://en.wikipedia.org/wiki/Credibility.
[7] CASTILLO C, MENDOZA M, POBLTETE B. Information credibility on Twitter [C] //Proceedings of Information International Conference on World Wide Web. New York, USA: ACM Press, 2011:675-684.
[8] 闫光辉, 刘晓飞, 王梦阳. 基于链接的微博用户可信度研究[J].计算机应用研究, 2015, 32(10):2910-2917. YAN Guanghui, LIU Xiaofei, WANG Mengyang. Research on credibility of microblog users based on link[J]. Application Research of Computers, 2015, 32(10):2910-2917.
[9] GUPTA M, ZHAO P, ZHAO J. Evaluation event credibility on Twitter[C] //Proceedings of the 2012 SIAM International Conference on Data Mining. California, USA: SIAM Press, 2012:153-164.
[10] MUKHERJEE A, LIU B, GLANCE N. Spotting fake reviewer groups in consumer reviewer[C] //Proceedings of the 21st International Conference on World Wide Web. New York, USA: ACM Press, 2012:191-200.
[11] CHU Z, GIANVECCHIO S, WANG H, et al. Detecting automation of twitter accounts: are you a human, bot, or cyborg?[J]. IEEE Transactions on Dependable and Secure Computing, 2012, 9(6):811-824.
[12] 徐建民, 粟武林, 吴树芳,等. 基于逻辑回归的微博用户可信度建模[J].计算机工程与设计,2015, 36(3):772-777. XU Jianmin, SU Wulin, WU Shufang, et al. Modeling user reliability based on logistic regression in Micro-blog[J]. Computer Engineerinlg and Design, 2015, 36(3):772-777.
[13] 苗家, 马军, 陈竹敏. 一种基于HITS算法的Blog文摘方法[J].中文信息学报, 2011, 25(1):104-109. MIAO Jia, MA Jun, CHEN Zhumin. A new HITS-based summarization approach for Blog [J]. Journal of Chinese Information Processing, 2011, 25(1):104-109.
[14] 周小平,梁循,张海燕. 基于R-C模型的微博用户社区发现[J]. 软件学报,2014,25(12):2808-2823. ZHOU Xiaoping, LIANG Xun, ZHANG Haiyan. User community detection Micro-blog using R-C model[J]. Journal of Software, 2014, 25(12):2808-2823.
[15] KLEINBERG J M. Authoritative sources in a hyperlinked environment[C] //Proceedings of the 9th Annual ACM-SIAM Symposium on Discrete Algorithms. New York, USA: ACM Press, 1998:668-677.
[16] 田中生. 基于影响力的社会网络关键用户识别方法研究 [D]. 长春:吉林大学, 2015. TIAN Zhongsheng. Research on key user identification method based on influence in social networks[D]. Changchun:Jinlin University, 2014.
[17] 李赫元, 俞晓明, 刘悦,等. 中文微博客的垃圾用户检测[J]. 中文信息学报, 2014, 28(3):62-67. LI Heyuan, YU Xiaoming, LIU Yue, et al. Research on detecting spammer in Micro-blogs[J]. Journal of Chinese Information Processing, 2014, 28(3):62-67.
[18] 王峰, 余伟, 李石君. 新浪微博平台上的用户可信度评估[J].计算机科学与探索, 2013, 7(12):1125-1134. WANG Feng, YU Wei, LI Shijun. Evaluation of user credibility based on Sina weibo platform[J]. Journal of Frontiers of Computer Science and Technology, 2013, 7(12):1125-1134.
[1] Mian ZHANG,Ying HUANG,Haiyi MEI,Yu GUO. Intelligent interaction method for power distribution robot based on Kinect [J]. Journal of Shandong University(Engineering Science), 2018, 48(5): 103-108.
[2] CHENG Xin, LIU Han, WANG Bo, LIANG Dian, CHEN Qiang. A fault-tolerant control architecture for active magnetic bearing based on dual core processor [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(2): 72-80.
[3] WU Hongyan, JI Junzhong. Flower pollination algorithm-based functional module detection in protein-protein interaction networks [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(1): 21-30.
[4] LIU Zhe, SONG Rui, ZOU Tao. End force tracking control algorithm of grinding robot based on model predictive control [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(1): 42-49.
[5] WANG Yijun, ZHANG Hui, LI Bo, YANG Chunming, ZHAO Xujian. A method of opinion leaders discovering based on the topical evolution [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2016, 46(2): 35-42.
[6] ZHOU Yongmei1, YANG Aimin1, LIN Jianghao2. A method of building Chinese microblog sentiment lexicon [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2014, 44(3): 36-40.
[7] WEI Xiaomin, XU Bin, GUAN Jihong. Prediction of protein energy hot spots based on recursion feature elimination [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2014, 44(2): 12-20.
[8] QI Zhen, YU Shu-yan, LIU Lu, WANG Shu-guang*. Kinetic and thermodynamic studies on the adsorption of tetracycline onto graphene [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2013, 43(3): 63-69.
[9] TIAN Chun-hua1,2, ZHAO Hua1,2, YAN Hui1,2, WU Juan1, LIU Ji-feng1,HU Hai-quan3, CHEN Xiao-hua4, ZHANG Chong1,2*. Theoretical investigations on the mutual interaction of one glycine molecule with  pristine and H-modified single-walled carbon nanotubes [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2013, 43(3): 57-62.
[10] ZHANG Xin-yi, ZHAI Yu-qing*. Conflict evidence in trust model based on evidence theory [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2013, 43(1): 48-53.
[11] GUO Jian-yi1,2, LEI Chun-ya1, YU Zheng-tao1,2, SU Lei1,2, ZHAO Jun1, TIAN Wei1. A semi-supervised learning method based on information entropy to extract the domain entity relation [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2011, 41(4): 7-12.
[12] SHEN Xiao-li, CHEN Yue-hui. Prediction of protein-protein interaction sites using ensemble neural networks [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2010, 40(6): 144-149.
[13] XU Hao, WEI Shou-shui*, ZHANG Jing-tao. Simulation and analysis of a new micro-fluidic active mixer [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2010, 40(3): 57-60.
[14] SHENG Wei-hua, ZHU Chun. A wearable computing approach for hand gesture and daily activity recognition in human-robot interaction [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2010, 40(3): 37-50.
[15] CAO Xin, SUN Xin-Li, LI Zhen. Improved grey Bootstrap method and its application in  reliability evaluation [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2010, 40(1): 144-148.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LI Ke,LIU Chang-chun,LI Tong-lei . Medical registration approach using improved maximization of mutual information[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2006, 36(2): 107 -110 .
[2] YUE Yuan-Zheng. Relaxation in glasses far from equilibrium[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(5): 1 -20 .
[3] CHENG Daizhan, LI Zhiqiang. A survey on linearization of nonlinear systems[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(2): 26 -36 .
[4] WANG Yong, XIE Yudong. Gas control technology of largeflow pipe[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(2): 70 -74 .
[5] LIU Xin 1, SONG Sili 1, WANG Xinhong 2. [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(2): 98 -100 .
[6] . [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(2): 104 -107 .
[7] CHEN Huaxin, CHEN Shuanfa, WANG Binggang. The aging behavior and mechanism of base asphalts[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(2): 125 -130 .
[8] . [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(2): 131 -136 .
[9] LI Shijin, WANG Shengte, HUANG Leping. Change detection with remote sensing images based on forward-backward heterogenicity[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(3): 1 -9 .
[10] ZHAO Ke-Jun, WANG Xin-Jun, LIU Xiang, CHOU Yi-Hong. Algorithms of continuous top-k join query over structured overlay networks[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(5): 32 -37 .