CN102779126A - Internet virtual space user credibility evaluation method based on game theory - Google Patents

Internet virtual space user credibility evaluation method based on game theory Download PDF

Info

Publication number
CN102779126A
CN102779126A CN2011101203442A CN201110120344A CN102779126A CN 102779126 A CN102779126 A CN 102779126A CN 2011101203442 A CN2011101203442 A CN 2011101203442A CN 201110120344 A CN201110120344 A CN 201110120344A CN 102779126 A CN102779126 A CN 102779126A
Authority
CN
China
Prior art keywords
user
centerdot
representes
expression
coefficient
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011101203442A
Other languages
Chinese (zh)
Other versions
CN102779126B (en
Inventor
夏正友
卜湛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Aeronautics and Astronautics
Original Assignee
Nanjing University of Aeronautics and Astronautics
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Aeronautics and Astronautics filed Critical Nanjing University of Aeronautics and Astronautics
Priority to CN201110120344.2A priority Critical patent/CN102779126B/en
Publication of CN102779126A publication Critical patent/CN102779126A/en
Application granted granted Critical
Publication of CN102779126B publication Critical patent/CN102779126B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to an internet virtual space user credibility evaluation method based on a game theory and belongs to the field of network security. The evaluation method mainly includes establishing a random game model, constructing a virtual social network, and introducing influencing factors of an interactive relationship between users to obtain a user utility function; then calculating a gain function of the two interactive users, and performing derivation to determine a Nash equilibrium; and finally using a cross multiplication method to obtain an initial credibility of a node, wherein the influencing factors include connection relation coefficients and semantic relation coefficients. According to the internet virtual space user credibility evaluation method based on the game theory, data information is fully acquired, and by means of the high accuracies and the accurate logical judgment capabilities of computer technologies, the time-consuming and labor-consuming brainwork of persons can be replaced so that software can automatically grade the credibility of the users according to mutual information and semantic information on the basis of information contents.

Description

Internet virtual space user's reliability evaluation method based on theory of games
Technical field
The present invention relates to a kind of internet virtual space user's reliability evaluation method, belong to network safety filed based on theory of games.
Background technology
BBS is a public place; The user is not familiar with each other; Therefore can freely talk animatedly; Because BBS is easy to and is used all over the world easily, and can utilize the communication background of magnanimity for the offender shielding to be provided, and therefore becomes the most attractive exchange way of crime or terroristic organization.Utilize information extraction technique can identify criminal organization, and the relation between individuality, tissue and the incident.Therefore we can use methods of social network, from the BBS virtual society, extract potential criminal network.
Some new technology have been applied to be analyzed in the criminal network.For example: COPLINK [1-3,10-13]Technology has been applied to the corporations that identify in the criminal network.Also have, some disperse or continuous Markov model is used to following crime dramas or the process of prediction in statistical study [4,5]., social network analysis [6,7]In methods such as cluster, centrad metering method, multidimensional scaling and block models be used to study criminal organization's network based on the crime dramas data construct [8,9]Some visual, automatic methods have presented the evolutionary process of criminal network [8]Dynamic society's network analysis method is by Daning Hu, and Siddharth Kaza and Hsinchun Chen in are used for investigating some suspicious information transmission persons in the narcotics trade network of real society [11]In this piece paper, we combine community network and spatial analysis technology, the transmission range between the research corporations [12]..In recent years, represented to the research of transportation of multiple drugs and other running aspect, market potential that potential network had certain dirigibility, to the investigation of law enforcement agency with intervene and also have certain elasticity [14]
Because BBS is a huge virtual society; Each user is a potential criminal; Interactive relation between the user is through posting and reply foundation, so the criminal investigation personnel hope to obtain through these clues each member's potential crime probability, and the relation between the user.As if this sound it being an impossible task, because the investigator must spend great amount of time and energy search database, reads the crime report, seeks the clue of crime corporations, artificial then crime probability of inferring other members in the potential criminal network.These tasks all are not only time-consuming but also effort.
Yet, also do not have a technology to extract interactive relation at present, and automatically make up potential criminal network from BBS.Correlative study before [13]By the partial information of having examined and combine the conviction propagation algorithm to infer other members' crime probability.But these potential crime probability nets all are manual foundation.Simultaneously, the local evidence of node i, and the compatible function between node i and the node j all produces at random.Though experimental result has confirmed our hypothesis, it still is difficult promoting this method.
Summary of the invention
Technical matters to be solved by this invention is the deficiency to the above-mentioned background technology; A kind of internet virtual space user's reliability evaluation method based on theory of games is provided, has made software give each user's confidence level marking automatically according to interconnected user on the network's interactive information and semantic information.
The present invention adopts following technical scheme for realizing the foregoing invention purpose:
Internet virtual space user's reliability evaluation method based on theory of games comprises the steps:
Step 1: set up a betting model at random;
Step 2: make up the virtual society network;
Step 3: two influence factors introducing the interactive relation between user and the user: annexation coefficient and semantic relation coefficient;
Step 4: obtain user's utility function;
Step 5: calculate mutual both sides' gain function:
Step 6: Nash Equilibrium is confirmed in differentiate to both sides' gain function;
Step 7: estimate the user credit grade, obtain the initial credit degree of this node with cross multiplication.
Said internet virtual space user's reliability evaluation method based on theory of games, the foundation of the betting model at random in the step 1 is following:
Definition tlv triple G=[i, { A i, R i], wherein player or user collect i={1 ..., K}, the available set of strategies A of user i i={ C representes the offender for C, L}, and L representes legal person, the benefit function of user i
R i = { U i cc , U i cl , U i lc , U i ll } ,
Wherein, K is arbitrarily greater than 1 integer; The benefit function of user i when
Figure BDA0000060388200000022
expression all is the offender as user i with the mutual user of user i; The benefit function of user i when
Figure BDA0000060388200000023
expression is offender and legal person respectively as user i with the mutual user of user i; The benefit function of user i when
Figure BDA0000060388200000024
expression is legal person and offender respectively as user i with the mutual user of user i, the benefit function of user i when
Figure BDA0000060388200000025
expression all is legal person as user i with the mutual user of user i.
Said internet virtual space user's reliability evaluation method based on theory of games, the virtual society network in the step 2 comprises: node and limit,
Said node is represented the user;
Said limit representes that two points that it connects have interactive relation, and promptly the user of two some representatives has interactive relation.
Said internet virtual space user's reliability evaluation method based on theory of games, the definition of annexation coefficient and semantic relation coefficient is following in the step 3:
M=(t+1)·(e+1) (1)
N=(s+1)·λ (2)
Wherein, M representes the annexation coefficient between the user, and N representes the semantic relation coefficient between the user; T representes the common answer degree of association between the user; E representes the mutual answer degree of association between the user, and s representes semantic association degree between the user, and λ representes to be used for the balance factor of balanced M and N.
Said internet virtual space user's reliability evaluation method based on theory of games, the definition of utility function is following in the step 4:
Figure BDA0000060388200000031
h i=log 10(p i·γ+r i·τ)?(3)
Wherein, σ representes the mutual beneficial coefficient between the offender, and δ representes the mutual beneficial coefficient between the validated user; P representes offender's semantic coefficient, and q representes the semantic coefficient of validated user, and α representes the relative advantage coefficient between the offender; β representes the relative advantage coefficient between the validated user, h iThe liveness of expression user i, p iThe number of posting of expression user i, r iThe answer number of expression user i, γ representes p iWeights, τ representes r iWeights.
Said internet virtual space user's reliability evaluation method based on theory of games, the definition of mutual both sides' gain function is following in the step 5:
Suppose variable x, y be respectively user i, with the mutual user's of user i potential crime probability, the gain function of user i is following:
R i ( x , y ) = U i cc · x · y + U i cl · x · ( 1 - y ) + U i lc · ( 1 - x ) · y + U i ll · ( 1 - x ) · ( 1 - y ) - - - ( 4 )
Said internet virtual space user's reliability evaluation method based on theory of games, the confirming as follows of Nash Equilibrium in the step 6: the gain function of user i is to representing the variable differentiate of the potential crime probability of user i,
k∈N(i) (5)
Wherein, all of its neighbor node of N (i) expression node i,
Figure BDA0000060388200000043
Expression user i is e on the limit IkOn distribution probability.
Said internet virtual space user's confidence level evaluation system based on theory of games, node goes out confirming as follows of initial trusted degree in the step 7:
φ i ( ϵ i c , ϵ i l ) = ( Π k ∈ N ( i ) η x ik Π k ∈ N ( i ) η x ik + Π k ∈ N ( i ) ( 1 - η x ik ) , 1 - Π k ∈ N ( i ) η x ik Π k ∈ N ( i ) η x ik + Π k ∈ N ( i ) ( 1 - η x ik ) ) - - - ( 6 )
Wherein, The all of its neighbor node of N (i) expression node i;
Figure BDA0000060388200000045
expression user i is offender's a probability, and expression user i is the probability of validated user.
The present invention adopts technique scheme, has following beneficial effect: abundant image data information; The pinpoint accuracy of computer technology and accurate logic determines ability can replace some brainwork of wasting time and energy of people; Software can be given a mark according to interactive information and automatic each the user's confidence level of must giving of semantic information based on the information content.
Description of drawings
Fig. 1 is the synoptic diagram of game at random between two users.
Fig. 2 is must the meet accident synoptic diagram of probability of node multiplication cross.
Fig. 3 (a) is the constructed original potential network OPN of the present invention.
Fig. 3 (b) is the constructed common answer potential network TPN of the present invention.
Fig. 3 (c) is the constructed common answer potential network EPN of the present invention.
Fig. 3 (d) is the constructed semantic potential network SPN of the present invention.
Fig. 3 (e) is the constructed original potential network k-OPN of k degree of the present invention.
Fig. 4 (a) is a Nash Equilibrium for every limit.
Fig. 4 (b) is the compatible function of node 1.
Fig. 5 is the curve map of the initial probability of node among the k-OPN.
Fig. 6 (a) is KPN in 2003, and threshold value k is 20.
Fig. 6 (b) is KPN in 2003, and threshold value k is 10.
Fig. 7 (a) is the local evidence of 2003 annual data samples one.
Fig. 7 (b) is the local evidence of 2003 annual data samples two.
Label declaration among the figure:
Among Fig. 1; Strategies representes set of strategies; Criminal representes the offender; Legal representes legal person; The benefit function of
Figure BDA0000060388200000051
expression user A when user A and user B are the offender; The benefit function of
Figure BDA0000060388200000052
expression user A when user A and user B are offender and legal person respectively; The benefit function of
Figure BDA0000060388200000053
expression user A when user A and user B are legal person and offender respectively; The benefit function of
Figure BDA0000060388200000054
expression user A when user A and user B are legal person; The benefit function of
Figure BDA0000060388200000055
expression user B when user A and user B are the offender;
Figure BDA0000060388200000056
benefit function of user B when user A and user B are offender and legal person respectively; The benefit function of
Figure BDA0000060388200000057
expression user B when user A and user B are legal person and offender respectively,
Figure BDA0000060388200000058
are represented the benefit function of user B when user A and user B are legal person.
Node is represented the user on the BBS among Fig. 2, and the relation of posting-replying between two nodes is represented on the limit, the frequency of interaction between two nodes of numeric representation among Fig. 2 (a) and (b), (c) on every limit; Among Fig. 2 (d), the numeric representation semantic information value on every limit; Among Fig. 2 (e), every limit marked is that numerical value is the value of annexation coefficient M and semantic relation coefficient N, the initial motivation of this node of data representation on each node limit.
Embodiment
Be elaborated below in conjunction with the technical scheme of accompanying drawing to invention:
The international observation plate of forum is gathered the data in year June in June, 2003 to 2010 from the ends of the earth, sets up database with this, comprising 324666 users, 99735 themes, 4712859 answers.User in the database posts or replys the share member at the international observation plate in the past 8 years.We utilize the web crawlers program to download the source code of webpage, and the information that collects comprises user's name, theme id, and subject content, reply content is posted date and answer date.We utilize regular expression from the webpage source code, to extract key message.
Realization based on game theoretic internet virtual space user's reliability evaluation method is following:
Step 1: introduce as betting model as shown in Figure 1, two players are exactly last two users with interactive relation of BBS.They be not familiar with each other, all surfing on the net.They are defined as the offender to be defined as legal person exactly.A just i={ C, L}.
Figure BDA0000060388200000061
expression when user A and user B are the offender, the benefit function of user A.Other can be by that analogy.Benefit function to user k can represent that
Figure BDA0000060388200000062
each user knows; If they are selected to validated user, everyone can obtain higher gain (benefit of value 100) so.If two people are selected to the disabled user, two people capitals obtain gain (value is 80 benefit) so.If they wherein a choose become the disabled user; And select another to be selected to validated user; The disabled user can obtain a gain (value is 20) and another validated user can obtain higher gain (value is 50) so. because therefore two users are difficult to and can cooperate respectively from the different local of the world and be not familiar with each other.In this example, from the selfish strategy of maximization payoff function, each user can be selected to validated user.Being easy to be confirmed, (L L) be Nash Equilibrium point unique in this game, and this equilibrium is not a Pareto optimality to point, and (C C) will produce bigger benefit for two players, yet this needs the cooperation between two criminals because select.Therefore, the rational conflict that exists between the social welfare very much clearly of individual early in this example.
As shown in Figure 2: because the node in potential network has a lot of abutment points, its local evidence can be influenced by a plurality of adjacent node, so the distribution probability of this node on certain bar limit can not be as local evidence.Here we obtain the initial probability of this node with multiplication cross, may the extend one's service potential crime probability of E of multiplication cross, and this allows.Because the purpose of our research is to help the investigator from mass data, to find suspicious person as much as possible.Although there is error, this method is seen still effectively on the whole.
Step 2: extract partial information from database and make up the virtual society network, comprise original potential network (OPN) as shown in Figure 1, jointly reply potential network (TPN), reply potential network (EPN), semantic potential network (SPN) jointly,
Because the relation between the node is easy to set up, therefore the limit of low weights does not have reference value in OPN, has therefore introduced threshold value, has removed the limit of weights less than k, if has all removed on all limits of certain node, this node also will be removed so.According to this method, made up that the k degree is original and post-reply network (k-OPN), shown in Fig. 1 (e), wherein k=1. connection type and node behavioural information can be from TPN, extract among EPN and the SPN;
Step 3: confirm annexation coefficient M and semantic relation coefficient N: with limit edge 1,6Be example, limit edge 1,6In, t 1,6=0, e 1,6=3, combine formula (1) to get M so 1,6=(t 1,6+ 1) (e 1,6+ 1)=4.Because
Figure BDA0000060388200000071
So N=s 1,61.3 ≈ 9, other limits are similar,
Wherein,
Figure BDA0000060388200000072
What calculate is balance factor, and avgt represents the average common recovery factor of whole network; Avg eRepresent the mutual recovery factor of whole network; Avg Abs (s)Represent the mean of the semantic coefficient absolute value of whole network.
Step 4: confirm utility function: the number of posting of node 1 is 20, and replying number is 245, obtains h in conjunction with formula (3) 1=log 10(p 1γ+r 1κ)=2.6484.Definition γ is 10, and κ is 1, and according to identical method, we can obtain h 6=2.1903, other limits are similar.
U 1 cc = σ · h 1 · M 1,6 + p · N 1,6 = 1 × 2.6484 × 4 + 0.5 × 9 = 15.0936 U 1 cl = α · h 1 · M 1,6 = 0.2 × 2.6484 × 4 = 2.1187 U 1 lc = β · h 1 · M 1,6 = 0.3 × 2.6484 × 4 = 3.1781 U 1 ll = δ · h 1 · M 1,6 + q · N 1,6 = 0.7 × 2.6484 × 4 + 1 × 9 = 16.4155
U 6 cc = σ · h 6 · M 1,6 + p · N 1,6 = 1 × 2.1903 × 4 + 0.5 × 9 = 13 . 2612 U 6 cl = α · h 6 · M 1,6 = 0.2 × 2 . 1903 × 4 = 1.7522 U 6 lc = β · h 6 · M 1,6 = 0.3 × 2 . 1903 × 4 = 2.6284 U 6 ll = δ · h 6 · M 1,6 + q · N 1,6 = 0.7 × 2 . 1903 × 4 + 1 × 9 = 15 . 1328
Among the k-OPN node to enliven coefficient as shown in table 1, wherein, post-num representes the number of posting, reply-num representes to reply number, liveness representes to enliven coefficient.
Node 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Post?num 20 2 2 4 5 8 ?... 7 4 8 10 10 30 3 15
Reply-num 245 35 65 45 33 75 ?... 55 25 85 145 100 95 65 145
liveness 2.65 1.74 193 193 1.92 2.19 ?... 2.10 181 2.22 2.39 2.30 2.60 198 2.47
Node enlivens coefficient among the table 1k-OPN
Step 5: calculate mutual both sides' gain function, suppose variable x, y be respectively user 1, with the mutual user's of user 6 potential crime probability, combine formula (4) to obtain user 1 and user's 6 gain function:
R 1 ( x , y ) = U 1 cc · x · y + U 1 cl · x · ( 1 - y ) + U 1 lc · ( 1 - x ) · y + U 1 ll · ( 1 - x ) · ( 1 - y )
R 6 ( x , y ) = U 6 cc · x · y + U 6 cl · y · ( 1 - x ) + U 6 lc · ( 1 - y ) · x + U 6 ll · ( 1 - x ) · ( 1 - y )
Step 6: Nash Equilibrium is confirmed in differentiate to gain function, obtains in conjunction with formula (5):
η x 1,6 = U 6 cc - U 6 lc U 6 cc + U 6 ll - U 6 cl - U 6 lc = 0.443 , η x 6,1 = U 1 cc - U 1 lc U 1 cc + U 1 ll - U 1 cl - U 1 lc = 0.436
In like manner can get the Nash Equilibrium on other limit.The Nash Equilibrium on every limit is shown in Fig. 3 (a), and the compatible function to node 1 of same method is shown in Fig. 3 (b).
Step 7: the initial probability of calculating each node.
Bring each value of step 4 gained into formula (6)
φ i ( ϵ i c , ϵ i l ) = ( Π k ∈ N ( i ) η x Ik Π k ∈ N ( i ) η x Ik + Π k ∈ N ( i ) ( 1 - η x Ik ) , 1 - Π k ∈ N ( i ) η x Ik Π k ∈ N ( i ) η x Ik + Π k ∈ N ( i ) ( 1 - η x Ik ) ) , Obtain the initial probability of node among the k-OPN.
At last, do an emulation relatively.From database, extract data in 2003, extract two samples as research.105 users are arranged in the sample one, 156 limits, threshold value k is 20.Comprised 321 users in the sample two, 576 limits, based on the purpose of sensibility analysis, we are made as 10 to threshold value k.We have obtained two K-OPN then.Like Fig. 5 (a), under the less relatively situation of threshold value k, building network is a dense graph.According to the game theory principle, we can obtain each node local evidence separately, and the local evidence of sample one and sample two is as shown in Figure 6.
For the relatively output of these two samples, we utilize the Chi-square Test of conspicuousness α=0.05 that the result is carried out the degree of fitting test, confirm with whether there being significant difference between the sample.When the crime probability of node greater than 0.75 the time, we think that this user is the offender.According to this criterion, we have found 6 offenders in sample one, in sample two, have found 41 offenders.The experimental result of two samples is presented in the table 3.According to the result, we can obtain χ 2=4.02, v=(2-1) (2-1).The inquiry chi-square distribution table, we obtain working as H 0=0.05 o'clock, 0.025<P<0.05.Therefore we think that when the scale of potential probability net was different, their crime probability also existed significant difference.The Chi-square Test result is as shown in table 2:
Figure BDA0000060388200000085
Table 2 Chi-square Test result
For raw data is assessed, we have invited the relevant expert in police office, Nanjing to our laboratory, and he had worked last 20 year in the law enforcement post.He has assessed the crime probability and the consistent matrix of each node in sample one and the sample two by hand.Suppose that our uses algorithm has found N different individuality, their crime probability all greater than 0.75. we also please this expert according to his experience, select the individuality of equal number.In order to detect the validity of our algorithm, we define an accurate rate formula:
precision = Φ expert ∩ Φ algorithm Φ algorithm × 100 %
Φ wherein Exp ertBy the offender that the expert chooses, Φ Alg orithmBe the offender who chooses according to our algorithm.The result shows Φ Exp ertAlmost with Φ Alg orithmNumber is the same, and the accuracy rate of our algorithm has reached 72.03% and 63.87% respectively in sample one and sample two.

Claims (8)

1. based on internet virtual space user's reliability evaluation method of theory of games, it is characterized in that: comprise the steps:
Step 1: set up a betting model at random;
Step 2: make up the virtual society network;
Step 3: two influence factors introducing the interactive relation between user and the user: annexation coefficient and semantic relation coefficient;
Step 4: obtain user's utility function;
Step 5: calculate mutual both sides' gain function:
Step 6: Nash Equilibrium is confirmed in differentiate to both sides' gain function;
Step 7: estimate the user credit grade, obtain the initial credit degree of this node with cross multiplication.
2. the internet virtual space user's reliability evaluation method based on theory of games as claimed in claim 1, it is characterized in that: the foundation of the described betting model at random of step 1 is following:
Definition tlv triple G=[i, { A i, R i], wherein player or user collect i={1 ..., K}, the available set of strategies A of user i i={ C representes the offender for C, L}, and L representes legal person, the benefit function of user i
R i = { U i cc , U i cl , U i lc , U i ll } ,
Wherein, K is arbitrarily greater than 1 integer; The benefit function of user i when
Figure FDA0000060388190000012
expression all is the offender as user i with the mutual user of user i; The benefit function of user i when
Figure FDA0000060388190000013
expression is offender and legal person respectively as user i with the mutual user of user i; The benefit function of user i when expression is legal person and offender respectively as user i with the mutual user of user i, the benefit function of user i when
Figure FDA0000060388190000015
expression all is legal person as user i with the mutual user of user i.
3. the internet virtual space user's reliability evaluation method based on theory of games as claimed in claim 1 is characterized in that: the described virtual society network of step 2 comprises: node and limit,
Said node is represented the user;
Said limit representes that two points that it connects have interactive relation, and promptly the user of two some representatives has interactive relation.
4. the internet virtual space user's reliability evaluation method based on theory of games as claimed in claim 1 is characterized in that: the definition of said annexation coefficient of step 3 and semantic relation coefficient is following:
M=(t+1)·(e+1) (1)
N=(s+1)·λ (2)
Wherein, M representes the annexation coefficient between the user, and N representes the semantic relation coefficient between the user; T representes the common answer degree of association between the user; E representes the mutual answer degree of association between the user, and s representes semantic association degree between the user, and λ representes to be used for the balance factor of balanced M and N.
5. the internet virtual space user's reliability evaluation method based on theory of games as claimed in claim 1, it is characterized in that: the definition of the said utility function of step 4 is following:
U i cc = σ · h i · M + p . N U i cl = α · h i · M U i lc = β · h i · M U i ll = δ · h i · M + q · N , h i=log 10(p i·γ+r i·τ) (3)
Wherein, σ representes the mutual beneficial coefficient between the offender, and δ representes the mutual beneficial coefficient between the validated user; P representes offender's semantic coefficient, and q representes the semantic coefficient of validated user, and α representes the relative advantage coefficient between the offender; β representes the relative advantage coefficient between the validated user, h iThe liveness of expression user i, p iThe number of posting of expression user i, r iThe answer number of expression user i, γ representes p iWeights, τ representes r iWeights.
6. the internet virtual space user's reliability evaluation method based on theory of games as claimed in claim 1 is characterized in that: the definition of the mutual both sides' gain function of step 5 is following:
Suppose variable x, y be respectively user i, with the mutual user's of user i potential crime probability, the gain function of user i is following:
R i ( x , y ) = U i cc · x · y + U i cl · x · ( 1 - y ) + U i lc · ( 1 - x ) · y + U i ll · ( 1 - x ) · ( 1 - y ) - - - ( 4 )
7. the internet virtual space user's reliability evaluation method based on theory of games as claimed in claim 1 is characterized in that: the confirming as follows of said Nash Equilibrium of step 6: the gain function of user i is to representing the variable differentiate of the potential crime probability of user i,
K ∈ N (i) (5) wherein, all of its neighbor node of N (i) expression node i,
Figure FDA0000060388190000024
Expression user i is e on the limit IkOn distribution probability.
8. the internet virtual space user's confidence level evaluation system based on theory of games as claimed in claim 1 is characterized in that: the described node of step 7 goes out confirming as follows of initial trusted degree:
φ i ( ϵ i c , ϵ i l ) = ( Π k ∈ N ( i ) η x ik Π k ∈ N ( i ) η x ik + Π k ∈ N ( i ) ( 1 - η x ik ) , 1 - Π k ∈ N ( i ) η x ik Π k ∈ N ( i ) η x ik + Π k ∈ N ( i ) ( 1 - η x ik ) ) - - - ( 6 )
Wherein, The all of its neighbor node of N (i) expression node i;
Figure FDA0000060388190000032
expression user i is offender's a probability, and expression user i is the probability of validated user.
CN201110120344.2A 2011-05-11 2011-05-11 Internet virtual space user credibility evaluation method based on game theory Active CN102779126B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110120344.2A CN102779126B (en) 2011-05-11 2011-05-11 Internet virtual space user credibility evaluation method based on game theory

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110120344.2A CN102779126B (en) 2011-05-11 2011-05-11 Internet virtual space user credibility evaluation method based on game theory

Publications (2)

Publication Number Publication Date
CN102779126A true CN102779126A (en) 2012-11-14
CN102779126B CN102779126B (en) 2015-03-11

Family

ID=47124043

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110120344.2A Active CN102779126B (en) 2011-05-11 2011-05-11 Internet virtual space user credibility evaluation method based on game theory

Country Status (1)

Country Link
CN (1) CN102779126B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106301880A (en) * 2015-06-29 2017-01-04 阿里巴巴集团控股有限公司 One determines that cyberrelationship degree of stability, Internet service recommend method and apparatus
CN106815257A (en) * 2015-12-01 2017-06-09 阿里巴巴集团控股有限公司 The computational methods and device of a kind of User reliability
CN106844463A (en) * 2016-12-21 2017-06-13 湖北大学 A kind of lsa cache algorithm of pervasive game equilibrium
CN110363636A (en) * 2019-06-27 2019-10-22 上海淇馥信息技术有限公司 Risk of fraud recognition methods and device based on relational network
CN112989592A (en) * 2021-03-09 2021-06-18 西北工业大学 Event scene modeling method based on dynamic crime network

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050067493A1 (en) * 2003-09-29 2005-03-31 Urken Arnold B. System and method for overcoming decision making and communications errors to produce expedited and accurate group choices
CN101599072A (en) * 2009-07-03 2009-12-09 南开大学 Intelligent computer systems building method based on information inference

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050067493A1 (en) * 2003-09-29 2005-03-31 Urken Arnold B. System and method for overcoming decision making and communications errors to produce expedited and accurate group choices
CN101599072A (en) * 2009-07-03 2009-12-09 南开大学 Intelligent computer systems building method based on information inference

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
王晓燕: "CtoC 电子商务中的信任问题:一个进化博弈分析模型", 《商业研究》 *
陈李钢等: "基于遗传算法的银行客户信用评估模型研究", 《计算机工程》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106301880A (en) * 2015-06-29 2017-01-04 阿里巴巴集团控股有限公司 One determines that cyberrelationship degree of stability, Internet service recommend method and apparatus
CN106301880B (en) * 2015-06-29 2019-12-24 阿里巴巴集团控股有限公司 Method and equipment for determining network relationship stability and recommending internet service
CN106815257A (en) * 2015-12-01 2017-06-09 阿里巴巴集团控股有限公司 The computational methods and device of a kind of User reliability
CN106844463A (en) * 2016-12-21 2017-06-13 湖北大学 A kind of lsa cache algorithm of pervasive game equilibrium
CN110363636A (en) * 2019-06-27 2019-10-22 上海淇馥信息技术有限公司 Risk of fraud recognition methods and device based on relational network
CN112989592A (en) * 2021-03-09 2021-06-18 西北工业大学 Event scene modeling method based on dynamic crime network

Also Published As

Publication number Publication date
CN102779126B (en) 2015-03-11

Similar Documents

Publication Publication Date Title
Wang et al. Shapley flow: A graph-based approach to interpreting model predictions
Bonato A course on the web graph
Bozarth et al. Toward a better performance evaluation framework for fake news classification
Feduhko Development of a software for computer-linguistic verification of socio-demographic profile of web-community member
CN102929942B (en) The overlapping community discovery method of a kind of community network based on integrated study
Jacques et al. Hurricanes and hegemony: A qualitative analysis of micro-level climate change denial discourses
Chacoff et al. Evaluating sampling completeness in a desert plant–pollinator network
Verdú et al. Phylogenetic relatedness as a tool in restoration ecology: a meta-analysis
Losapio et al. Resistance of plant–plant networks to biodiversity loss and secondary extinctions following simulated environmental changes
Pavoine et al. Functional and phylogenetic similarity among communities
CN102779126B (en) Internet virtual space user credibility evaluation method based on game theory
Liu et al. Pandemics are catalysts of scientific novelty: Evidence from COVID‐19
CN104199938B (en) Agricultural land method for sending information and system based on RSS
Zhang et al. Resilience analysis of countries under disasters based on multisource data
CN102955813A (en) Information searching method and information searching system
Bhavnani et al. Modeling civil violence in Afghanistan: Ethnic geography, control, and collaboration
Grindrod et al. Comparison of social structures within cities of very different sizes
Ryabov et al. Estimation of functional diversity and species traits from ecological monitoring data
CN103440352A (en) Method and device for analyzing correlation among objects based on deep learning
Zarei et al. Deep dive on politician impersonating accounts in social media
Leão et al. Evolutionary patterns in the geographic range size of Atlantic Forest plants
Casiraghi Multiplex Network Regression: How do relations drive interactions?
Martínez‐Blancas et al. Related plant species respond similarly to chronic anthropogenic disturbance: Implications for conservation decision‐making
Abastante et al. Addressing the Location of Undesirable Facilities through the Dominance‐based Rough Set Approach
CN105869058A (en) Method for user portrait extraction based on multilayer latent variable model

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant