DocumentCode
1799790
Title
Untrusted User Detection in Microblogs
Author
Zidan Yu ; Huiqun Yu
Author_Institution
Dept. of Comput. Sci. & Eng., East China Univ. of Sci. & Technol., Shanghai, China
fYear
2014
fDate
24-26 Sept. 2014
Firstpage
558
Lastpage
564
Abstract
As Micro blogs such as Sina Weibo and Twitter are becoming increasingly popular, a lot of users are benefiting from the convenience of social communication and information sharing. However, untrusted users can take advantage of these sites as gateways to make money, spread rumors and so on. This paper proposes a label propagation algorithm based on the trust model to detect the untrusted users on social networking sites. The algorithm consists of two main steps. Firstly, we conduct a hybrid graph with three types of nodes (users, tweets, topics) to model the trust relationship between each user pair. Secondly, we utilize a new method inspired by the Label Propagation Algorithm to detect more untrusted users based on a small known seed set. We conduct experiments with a real data set, and the evaluation demonstrates the effectiveness, efficiency, and scalability of the proposed solution.
Keywords
graph theory; social networking (online); trusted computing; hybrid graph; information sharing; label propagation algorithm; microblogs; social communication; social networking sites; topics; trust model; trust relationship; tweets; untrusted user detection; Algorithm design and analysis; Classification algorithms; Educational institutions; Semantics; Twitter; Vectors; hybrid graph; label propagation; trust model; untrusted user detection;
fLanguage
English
Publisher
ieee
Conference_Titel
Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on
Conference_Location
Beijing
Type
conf
DOI
10.1109/TrustCom.2014.71
Filename
7011295
Link To Document