• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Wang, Xiujuan (Wang, Xiujuan.) | Zheng, Qianqian (Zheng, Qianqian.) | Zheng, Kangfeng (Zheng, Kangfeng.) | Sui, Yi (Sui, Yi.) | Zhang, Jiayue (Zhang, Jiayue.)

Indexed by:

EI Scopus

Abstract:

Malicious social robots are the disseminators of malicious information on social networks, which seriously affect information security and network environments. Efficient and reliable classification of social robots is crucial for detecting information manipulation in social networks. Supervised classification based on manual feature extraction has been widely used in social robot detection. However, these methods not only involve the privacy of users but also ignore hidden feature information, especially the graph feature, and the label utilization rate of semi-supervised algorithms is low. Aiming at the problems of shallow feature extraction and low label utilization rate in existing social network robot detection methods, in this paper a robot detection scheme based on weighted network topology is proposed, which introduces an improved network representation learning algorithm to extract the local structure features of the network, and combined with the graph convolution network (GCN) algorithm based on the graph filter, to obtain the global structure features of the network. An end-to-end semi-supervised combination model (Semi-GSGCN) is established to detect malicious social robots. Experiments on a social network dataset (cresci-rtbust-2019) show that the proposed method has high versatility and effectiveness in detecting social robots. In addition, this method has a stronger insight into robots in social networks than other methods. © 2020 Tech Science Press. All rights reserved.

Keyword:

Social robots Semi-supervised learning Extraction Feature extraction Graph algorithms Neural networks Classification (of information) Security of data Topology Economic and social effects Learning algorithms

Author Community:

  • [ 1 ] [Wang, Xiujuan]Information Technology Institute, Beijing University of Technology, Beijing; 100124, China
  • [ 2 ] [Zheng, Qianqian]Information Technology Institute, Beijing University of Technology, Beijing; 100124, China
  • [ 3 ] [Zheng, Kangfeng]School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing; 100876, China
  • [ 4 ] [Sui, Yi]Information Technology Institute, Beijing University of Technology, Beijing; 100124, China
  • [ 5 ] [Zhang, Jiayue]Information Technology Institute, Beijing University of Technology, Beijing; 100124, China

Reprint Author's Address:

  • [zheng, qianqian]information technology institute, beijing university of technology, beijing; 100124, china

Show more details

Related Keywords:

Related Article:

Source :

Computers, Materials and Continua

ISSN: 1546-2218

Year: 2020

Issue: 1

Volume: 65

Page: 617-638

3 . 1 0 0

JCR@2022

ESI Discipline: COMPUTER SCIENCE;

ESI HC Threshold:132

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count: 4

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 4

Affiliated Colleges:

Online/Total:335/10564455
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.