A user identification algorithm based on user behavior analysis in social networks

K Deng, L Xing, L Zheng, H Wu, P Xie, F Gao - IEEE Access, 2019 - ieeexplore.ieee.org
The precision of the conventional user identification algorithm is not satisfactory because it
ignores the role of user-generated data in identity matching. In this paper, we propose a …

User role identification based on social behavior and networking analysis for information dissemination

X Zhou, B Wu, Q Jin - Future Generation Computer Systems, 2019 - Elsevier
Nowadays, along with the high development of emerging computational paradigms, more
and more populations have been involved into the social revolution across various …

A survey of across social networks user identification

L Xing, K Deng, H Wu, P Xie, HV Zhao, F Gao - IEEE Access, 2019 - ieeexplore.ieee.org
With the popularization of the Internet and the arrival of the big data era, numerous different
social networks (SNs) have emerged to satisfy users' social needs and offer them rich …

Behavioral habits-based user identification across social networks

L Xing, K Deng, H Wu, P Xie, J Gao - Symmetry, 2019 - mdpi.com
Social networking is an interactive Internet of Things. The symmetry of the network can
reflect the similar friendships of users on different social networks. A user's behavior habits …

A multiuser identification algorithm based on internet of things

K Deng, L Xing, M Zhang, H Wu… - … and Mobile Computing, 2019 - Wiley Online Library
With the rapid development of the Internet of Things (IoT) in 4G/5G deployments, the
massive amount of network data generated by users has exploded, which has not only …

Intelligent recommendation algorithm for social networks based on gradient particle swarm optimization

L Xiao-Li - Journal of Physics: Conference Series, 2019 - iopscience.iop.org
Aiming to improve the intelligent recommendation ability of users in social networks, an
intelligent recommendation algorithm for social networks based on gradient particle swarm …

Network Location Information Hiding Algorithm Based on Machine Learning

B Wang, L Zhang, G Zhang - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
In order to improve the security of network location information, it is necessary to design the
network location information hiding, and an information hiding technology is proposed …

Authentication schemes for social network users: a review

SS Ninawe, P Venkataram - International Journal of Social …, 2019 - inderscienceonline.com
Social networks have been very successful for information sharing due to the rapid
development of communication and networking. As the technology modernised and many …