JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE) ›› 2016, Vol. 46 ›› Issue (5): 7-12.doi: 10.6040/j.issn.1672-3961.1.2016.257
Previous Articles Next Articles
WU Shufang1,2, XU Jianmin3 *
CLC Number:
[1] SONG J, LEE S, KIM J. Spam filtering in Twitter using sender-receiver relationship[M]. Berlin, German:Springer, 2006:301-317. [2] 王越, 张剑金, 刘芳芳. 一种多特征微博僵尸粉检测方法与实现[J]. 中国科技论文, 2014, 9(1):81-86. WANG Yue, ZHANG Jianjin, LIU Fangfang. Detection of micro-blog zombie fans based on multi-features[J]. China Science Paper, 2014, 9(1):81-86. [3] 刘晓飞. 基于链接分析的微博用户可信度研究[D]. 兰州:兰州交通大学, 2015. LIU Xiaofei. Research on credibility of microblog users based on link analysis[D]. Lanzhou:Lanzhou Jiaotong University, 2015. [4] 蒋盛益, 陈东沂, 庞观松,等. 微博信息可信度分析研究综述[J]. 图书情报工作, 2013, 57(12):136-142. JIANG Shengyi, CHEN Dongyi, PANG Guansong, et al. A review of micro-blog information reliability analysis[J]. Library and Information Service, 2013, 57(12):136-142. [5] 毛佳昕, 刘奕群, 张敏,等. 基于用户交互行为的微博用户社会影响力分析[J]. 计算机学报, 2014, 37(4):791-880. MAO Jiaxin, LIU Yiqun, ZHANG Min, et al. Social influence analysis for micro-blog user based on user behavior[J]. Chinese Journal of Computers, 2014, 37(4):791-880. [6] Wikipedia Inc. Credibility[EB/OL].(2013-01-20)[2015-01-20].http://en.wikipedia.org/wiki/Credibility. [7] CASTILLO C, MENDOZA M, POBLTETE B. Information credibility on Twitter [C] //Proceedings of Information International Conference on World Wide Web. New York, USA: ACM Press, 2011:675-684. [8] 闫光辉, 刘晓飞, 王梦阳. 基于链接的微博用户可信度研究[J].计算机应用研究, 2015, 32(10):2910-2917. YAN Guanghui, LIU Xiaofei, WANG Mengyang. Research on credibility of microblog users based on link[J]. Application Research of Computers, 2015, 32(10):2910-2917. [9] GUPTA M, ZHAO P, ZHAO J. Evaluation event credibility on Twitter[C] //Proceedings of the 2012 SIAM International Conference on Data Mining. California, USA: SIAM Press, 2012:153-164. [10] MUKHERJEE A, LIU B, GLANCE N. Spotting fake reviewer groups in consumer reviewer[C] //Proceedings of the 21st International Conference on World Wide Web. New York, USA: ACM Press, 2012:191-200. [11] CHU Z, GIANVECCHIO S, WANG H, et al. Detecting automation of twitter accounts: are you a human, bot, or cyborg?[J]. IEEE Transactions on Dependable and Secure Computing, 2012, 9(6):811-824. [12] 徐建民, 粟武林, 吴树芳,等. 基于逻辑回归的微博用户可信度建模[J].计算机工程与设计,2015, 36(3):772-777. XU Jianmin, SU Wulin, WU Shufang, et al. Modeling user reliability based on logistic regression in Micro-blog[J]. Computer Engineerinlg and Design, 2015, 36(3):772-777. [13] 苗家, 马军, 陈竹敏. 一种基于HITS算法的Blog文摘方法[J].中文信息学报, 2011, 25(1):104-109. MIAO Jia, MA Jun, CHEN Zhumin. A new HITS-based summarization approach for Blog [J]. Journal of Chinese Information Processing, 2011, 25(1):104-109. [14] 周小平,梁循,张海燕. 基于R-C模型的微博用户社区发现[J]. 软件学报,2014,25(12):2808-2823. ZHOU Xiaoping, LIANG Xun, ZHANG Haiyan. User community detection Micro-blog using R-C model[J]. Journal of Software, 2014, 25(12):2808-2823. [15] KLEINBERG J M. Authoritative sources in a hyperlinked environment[C] //Proceedings of the 9th Annual ACM-SIAM Symposium on Discrete Algorithms. New York, USA: ACM Press, 1998:668-677. [16] 田中生. 基于影响力的社会网络关键用户识别方法研究 [D]. 长春:吉林大学, 2015. TIAN Zhongsheng. Research on key user identification method based on influence in social networks[D]. Changchun:Jinlin University, 2014. [17] 李赫元, 俞晓明, 刘悦,等. 中文微博客的垃圾用户检测[J]. 中文信息学报, 2014, 28(3):62-67. LI Heyuan, YU Xiaoming, LIU Yue, et al. Research on detecting spammer in Micro-blogs[J]. Journal of Chinese Information Processing, 2014, 28(3):62-67. [18] 王峰, 余伟, 李石君. 新浪微博平台上的用户可信度评估[J].计算机科学与探索, 2013, 7(12):1125-1134. WANG Feng, YU Wei, LI Shijun. Evaluation of user credibility based on Sina weibo platform[J]. Journal of Frontiers of Computer Science and Technology, 2013, 7(12):1125-1134. |
[1] | Mian ZHANG,Ying HUANG,Haiyi MEI,Yu GUO. Intelligent interaction method for power distribution robot based on Kinect [J]. Journal of Shandong University(Engineering Science), 2018, 48(5): 103-108. |
[2] | CHENG Xin, LIU Han, WANG Bo, LIANG Dian, CHEN Qiang. A fault-tolerant control architecture for active magnetic bearing based on dual core processor [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(2): 72-80. |
[3] | WU Hongyan, JI Junzhong. Flower pollination algorithm-based functional module detection in protein-protein interaction networks [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(1): 21-30. |
[4] | LIU Zhe, SONG Rui, ZOU Tao. End force tracking control algorithm of grinding robot based on model predictive control [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(1): 42-49. |
[5] | WANG Yijun, ZHANG Hui, LI Bo, YANG Chunming, ZHAO Xujian. A method of opinion leaders discovering based on the topical evolution [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2016, 46(2): 35-42. |
[6] | ZHOU Yongmei1, YANG Aimin1, LIN Jianghao2. A method of building Chinese microblog sentiment lexicon [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2014, 44(3): 36-40. |
[7] | WEI Xiaomin, XU Bin, GUAN Jihong. Prediction of protein energy hot spots based on recursion feature elimination [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2014, 44(2): 12-20. |
[8] | QI Zhen, YU Shu-yan, LIU Lu, WANG Shu-guang*. Kinetic and thermodynamic studies on the adsorption of tetracycline onto graphene [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2013, 43(3): 63-69. |
[9] | TIAN Chun-hua1,2, ZHAO Hua1,2, YAN Hui1,2, WU Juan1, LIU Ji-feng1,HU Hai-quan3, CHEN Xiao-hua4, ZHANG Chong1,2*. Theoretical investigations on the mutual interaction of one glycine molecule with pristine and H-modified single-walled carbon nanotubes [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2013, 43(3): 57-62. |
[10] | ZHANG Xin-yi, ZHAI Yu-qing*. Conflict evidence in trust model based on evidence theory [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2013, 43(1): 48-53. |
[11] | GUO Jian-yi1,2, LEI Chun-ya1, YU Zheng-tao1,2, SU Lei1,2, ZHAO Jun1, TIAN Wei1. A semi-supervised learning method based on information entropy to extract the domain entity relation [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2011, 41(4): 7-12. |
[12] | SHEN Xiao-li, CHEN Yue-hui. Prediction of protein-protein interaction sites using ensemble neural networks [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2010, 40(6): 144-149. |
[13] | XU Hao, WEI Shou-shui*, ZHANG Jing-tao. Simulation and analysis of a new micro-fluidic active mixer [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2010, 40(3): 57-60. |
[14] | SHENG Wei-hua, ZHU Chun. A wearable computing approach for hand gesture and daily activity recognition in human-robot interaction [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2010, 40(3): 37-50. |
[15] | CAO Xin, SUN Xin-Li, LI Zhen. Improved grey Bootstrap method and its application in reliability evaluation [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2010, 40(1): 144-148. |
|