Information Propagation Prediction Based on Key Users Authentication in Microblogging

In microblogging, key users are a significant factor for information propagation. Key users can affect information propagation size while retweeting the information. In this paper, to predict information propagation, we propose a novel linear model based on key users authentication. This model mines key users to dynamically improve the linear model while predicting information propagation. So our model can not only predict information propagation but also mine key users. Experimental results show that our model can achieve remarkable efficiency on predicting information propagation problem in real microblogging networks. At the same time, our model can find the key users who affect information propagation.

[1]  Wanlei Zhou,et al.  Security in next generation wireless networks , 2010, Secur. Commun. Networks.

[2]  Ping Wang,et al.  fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[3]  Gleb Gusev,et al.  Prediction of retweet cascade size over time , 2012, CIKM.

[4]  Jianmin Wang,et al.  Micro-blog in China: identify influential users and automatically classify posts on Sina micro-blog , 2014, J. Ambient Intell. Humaniz. Comput..

[5]  Hosung Park,et al.  What is Twitter, a social network or a news media? , 2010, WWW '10.

[6]  Muhammad Khurram Khan,et al.  A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments , 2017, Secur. Commun. Networks.

[7]  Ying Zhang,et al.  Retweet Modeling Using Conditional Random Fields , 2011, 2011 IEEE 11th International Conference on Data Mining Workshops.

[8]  Chenyu Wang,et al.  Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card , 2017, Secur. Commun. Networks.

[9]  Virgílio A. F. Almeida,et al.  Finding trendsetters in information networks , 2012, KDD.

[10]  Jure Leskovec,et al.  Can cascades be predicted? , 2014, WWW.

[11]  Yung-Hui Li,et al.  An Accurate and Efficient User Authentication Mechanism on Smart Glasses Based on Iris Recognition , 2017, Mob. Inf. Syst..

[12]  赵辉,et al.  Micro-blogs Entity Recognition Based on DSTCRF , 2014 .

[13]  Ping Wang,et al.  Targeted Online Password Guessing: An Underestimated Threat , 2016, CCS.

[14]  Jure Leskovec,et al.  Modeling Information Diffusion in Implicit Networks , 2010, 2010 IEEE International Conference on Data Mining.

[15]  Y. Wang,et al.  A Multidimensional Nonnegative Matrix Factorization Model for Retweeting Behavior Prediction , 2015 .

[16]  Krishna P. Gummadi,et al.  Measuring User Influence in Twitter: The Million Follower Fallacy , 2010, ICWSM.

[17]  Juan-Zi Li,et al.  Understanding retweeting behaviors in social networks , 2010, CIKM.

[18]  Kaiming,et al.  Short Texts Classification Through Reference Document Expansion , 2014 .