Exploiting Two‐Level Information Entropy across Social Networks for User Identification

L Xing, K Deng, H Wu, P Xie… - … and Mobile Computing, 2021 - Wiley Online Library
… Narayanan and Shmatikov [22] demonstrated that user identification can be accomplished
by relying on network topology information; however, the user identification performance …

Identifying user behavior on Twitter based on multi-scale entropy

S He, H Wang, ZH Jiang - Proceedings 2014 IEEE …, 2014 - ieeexplore.ieee.org
… -detection, trend identification, trust management, user-modeling in online social media. …
companies use twitter for advertisement, these people usually create lots of spam information

Where you are is who you are: User identification by matching statistics

FM Naini, J Unnikrishnan, P Thiran… - … on Information …, 2015 - ieeexplore.ieee.org
… -one user identification. Furthermore, we show that using the optimal method for identification
indeed gives higher identification … in resisting user identification attacks on these datasets. …

Influential nodes identification in complex networks via information entropy

C Guo, L Yang, X Chen, D Chen, H Gao, J Ma - Entropy, 2020 - mdpi.com
… aimed to identify a set of influential nodes via information entropy. Firstly, the information
entropy of … Then, select the node with the largest information entropy and renovate its l-length …

A Semi-Supervised User Group Identification Based on Synergetic Neural Network and Information Entropy

Z Huang, Y Chen - Sensors & Transducers, 2013 - search.proquest.com
identify user groups; Secondly, we propose a noise filter based on information entropy to
reduce … in this paper has a higher performance for user group identification, and provide a good …

Δ-Entropy: Definition, properties and applications in system identification with quantized data

B Chen, Y Zhu, J Hu, JC Prı - Information Sciences, 2011 - Elsevier
… In Section 4.2, we apply the Δ-entropy criterion in system identification with quantized I/O
data. The estimation of distribution algorithm (EDA) is used as the parameter search algorithm, …

Collaborative filtering with entropy‐driven user similarity in recommender systems

W Wang, G Zhang, J Lu - International Journal of Intelligent …, 2015 - Wiley Online Library
… the entropy evaluation and introduce user coherence by taking the relative differences between
ratings into account. We will show that the information entropy … if we identify the potential …

An entropy-based analytic model for the privacy-preserving in open data

SH Kim, C Jung, YJ Lee - … Conference on Big Data (Big Data), 2016 - ieeexplore.ieee.org
… an entropy-based guideline for open dataset. In the guideline, we introduce a re-identification
It means that the entropy is how much information we need to identify data. In other words, …

Attribute susceptibility and entropy based data anonymization to improve users community privacy and utility in publishing data

A Majeed, S Lee - Applied Intelligence, 2020 - Springer
… a user attributes’ susceptibility and entropy based … unique identifications of multiple users
(ie, users’ community) caused by the highly susceptible QIs. We adapt the information entropy

Information entropy based event detection during disaster in cyber-social networks

A Bhuvaneswari, C Valliyammai - Journal of Intelligent & …, 2019 - content.iospress.com
… The attributes considered for the analytics are Twitter User ID, Time, Time-zone, Tweet,
Geo-location, URL, retweet count, replies, followers. After pre-processing the tweets, word …