CN108400883B - A Realization Method of Social Hierarchy Model Based on Network Information Flow - Google Patents

A Realization Method of Social Hierarchy Model Based on Network Information Flow Download PDF

Info

Publication number
CN108400883B
CN108400883B CN201810017429.XA CN201810017429A CN108400883B CN 108400883 B CN108400883 B CN 108400883B CN 201810017429 A CN201810017429 A CN 201810017429A CN 108400883 B CN108400883 B CN 108400883B
Authority
CN
China
Prior art keywords
node
network
message
true
nodes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810017429.XA
Other languages
Chinese (zh)
Other versions
CN108400883A (en
Inventor
宣琦
殳欣成
阮中远
王金宝
傅晨波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University of Technology ZJUT
Original Assignee
Zhejiang University of Technology ZJUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University of Technology ZJUT filed Critical Zhejiang University of Technology ZJUT
Priority to CN201810017429.XA priority Critical patent/CN108400883B/en
Publication of CN108400883A publication Critical patent/CN108400883A/en
Application granted granted Critical
Publication of CN108400883B publication Critical patent/CN108400883B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

一种基于网络信息流的社会分层模型实现方法,包括以下步骤:S1:导入网络;S2:选取智慧节点,假设整个网络有且仅有1个智慧节点;S3:初始化权重,在网络中每条有向连边权重都分配一个固定常数;S4:通过基于级联信息传播真假消息,遍历网络中每个普通节点,循环多次,最终统计每个普通节点作为源节点时整个网络转发真假消息的平均数量;S5:计算网络社会分层模型指标,包括真消息信息扩散能力差异值和假消息信息扩散能力差异值。当社会网络存在智慧节点时,真假消息传播数量在整个网络中会出现社会分层现象。本发明提供一种基于网络信息流的社会分层模型实现方法。该模型能帮助研究人员更好地了解网络中社会分层现象出现的机制,以及智慧节点的作用。

Figure 201810017429

A method for realizing a social stratification model based on network information flow, comprising the following steps: S1: importing the network; S2: selecting a smart node, assuming that there is only one smart node in the entire network; S3: initializing the weight, in the network each Each directed edge weight is assigned a fixed constant; S4: By propagating true and false news based on cascading information, traversing each common node in the network, looping multiple times, and finally counting each common node as a source node The entire network forwards true The average number of fake news; S5: Calculate the index of the network social stratification model, including the difference value of the information diffusion ability of the true news and the difference value of the information diffusion ability of the fake news. When there are smart nodes in the social network, the number of true and false news spreads will appear social stratification in the entire network. The invention provides a method for realizing a social stratification model based on network information flow. This model can help researchers better understand the mechanism of social stratification in the network and the role of intelligent nodes.

Figure 201810017429

Description

Social layering model implementation method based on network information flow
Technical Field
The invention relates to the field of network information propagation, in particular to a social layering model implementation method based on network information flow.
Background
With the rapid development of computer communication technology and web 2.0, the way people interact is greatly changed compared with the traditional way of communication. In the traditional society, information exchange of people is limited by a plurality of factors such as time, space and the like, and the appearance of an online social network provides people with a virtual social platform which can realize unlimited interaction only by a computer and a network. Users are not only receivers of information, but also producers and distributors of information. The appearance of social media also changes the traditional information diffusion mode, and a huge interpersonal information transmission network is established when people exchange information through the social network. The change of information transmission paths brings a revolution to individual information transmission behaviors.
In general, social stratification is the relative social status of individuals in a social group, primarily based on their occupation and income, wealth and social status, or derived powers.
Disclosure of Invention
In order to overcome the defect that the existing social network does not consider social layering, the social layering phenomenon in sociology is migrated to the social network information transmission according to the occurrence of the social layering phenomenon in sociology, the invention provides a social layering model implementation method based on network information flow, so that the social layering phenomenon similar to the social layering phenomenon in sociology appears in the true and false information transmission of the social network.
The technical scheme adopted by the invention for solving the technical problems is as follows:
a social layering model implementation method based on intelligent social network information flow comprises the following steps:
s1: the import network set G ═ (V, E, W), and its node set and connected edge set are V ═ { V, respectively1,v2,...,vnAnd
Figure GDA0002825674060000011
a weight set W and a total number N of nodes;
s2: selecting an intelligent node; labeling network nodes, setting the nodes with the label 1 as intelligent nodes, and assuming that the whole network has only 1 intelligent node for researching the training process of the learning method;
s3: initializing the weight; each directed connecting edge in the network is from vjDirection vkAre assigned a fixed constant of 0.5, i.e., wjk0.5. Weight wjkDenotes vkFor vjThe degree of trust of;
s4: and (3) cascading information propagation: and traversing each node of the network in the order of the labels as a source node for information propagation, and issuing true and false messages. If the source node vjFor intelligent nodes, only true messages are published. If the source node vjAnd the message or the false message is issued with equal probability for the common node. When a node vkNode v, observing messages from its neighbor nodeskOne of the neighboring neighbor nodes will be chosen at first randomly, denoted as vjThen the cascade information propagation model is as follows:
if v iskIs an intelligent node, if it is a true message, it forwards the message with probability p ═ η, otherwise refuse to issue;
if v iskIs a common node and has the probability p ═ η · w that the message is forwardedjkWhether it is true or false. Eta of 0 to 1 is the natural forwarding rate;
each node has only one opportunity to propagate, and the node which can see the information in the network stops after all the nodes are forwarded and inquired, and the propagation process is recorded as 1 time. After stopping, respectively counting the quantity of forwarding true messages and false messages in the whole network when each node is used as a source node;
s5: calculating indexes of the network social layering model; after the transmission of true and false messages in the whole intelligent social network is completed, by counting the number of forwarded true and false messages, the indexes of the network social hierarchical model can be calculated and are respectively represented by DT(i) And DF(i) And (4) showing. Then, we define the true message information diffusion capability difference value D of the ith nodeT(i) And false message information diffusion capability difference value DF(i) The following are:
DT(i)=nT(i)-nT(i+1),(i≥2)(1)
DF(i)=nF(i)-nF(i+1),(i≥2)(2)
wherein n isT(i) And nF(i) Respectively representing the number of true and false messages forwarded in the whole network when the ith node is taken as a source node;
on the basis, the difference value D of the diffusion capability is spread according to the true message informationT(i) And false message information diffusion capability difference value DF(i) The social layering phenomenon of information flow in the whole intelligent social network can be observed.
Further, the information cascade model in the step S4The node set which has forwarded information in the network is marked as VreachedInitially, only information source nodes are contained; if the neighbor node of the node belongs to VreachedAnd the neighbor nodes of the node are marked as V without forwarding inquirynoworked(ii) a If the neighbor node of the node belongs to VreachedAnd has made forwarding inquiries, the neighbor nodes of the node are marked as Vworked(ii) a After the neighbor node of a certain node k forwards information, the node k can see the information, and the node k forwards the information according to the probability p; setting total cycle times M for each node serving as a source node to issue true and false messages; the process is as follows:
4.1) selecting a common node j in the network as a source node of information propagation, and respectively issuing true and false messages;
4.2) selecting any one of VnoworkedNode k in (1), generates [0,1 ] according to the network information propagation model]If node k is a smart node, if this is a true message and p' ≦ η, the probability that node k will forward the message, otherwise publication is denied. If node k is a normal node and p' ≦ η · wjkThe probability that node k will forward the message regardless of whether the information is true or false. Eta of 0 to 1 is the natural forwarding rate;
4.3)4.2), if node k forwards the information, add to V the neighbor nodes of node knoworkedIn (3), remove node k out of VnoworkedIs added to Vreached(ii) a If node k does not forward, node k enters Vworked
4.4) when VnoworkedWhen no node exists, the current cycle stops, which indicates that all nodes seeing the information are processed; vreachedI.e., representing the set of nodes propagated to;
4.5) separately counting the number of forwarded accumulated true messages to nT(j) And number of bogus message forwards to nF(j)。
4.6) continuously repeating the steps 4.1) -4.5) until the total cycle number M is reached, stopping propagation, and calculating the average value of the true message forwarding number of the final common nodeMean value
Figure GDA0002825674060000031
And average of the number of bogus message hops
Figure GDA0002825674060000032
4.7) traversing each common node of the network, repeating 4.1) -4.6), and finally obtaining the average value of the number of true messages and the number of false messages forwarded by the whole network when the common nodes are used as source nodes.
The invention has the beneficial effects that: information exists in only two states: true message, false message. We propose an information propagation model: the intelligent nodes in the network are considered to have certain capability to distinguish the two different information, and the intelligent nodes can propagate true messages according to a certain mode and prevent false messages. Meanwhile, a social layering concept based on network information flow is provided, and when intelligent nodes exist in the social network, the social layering phenomenon can occur in the whole social network due to the propagation quantity of true and false messages. Based on the method, a social layering model implementation method based on intelligent social network information flow is provided, and through combination with simulation experiments, the model can help researchers to better understand the mechanism of social layering in the intelligent social network and the effect of intelligent nodes.
Drawings
FIG. 1 is an algorithm flow chart of a social hierarchical model implementation method based on network information flow.
FIG. 2 is a diagram of the difference D between different eta values and true message information diffusion capability in the chain network according to the present inventionT(i) And (5) a variation graph.
FIG. 3 is a diagram of the difference D between different eta values and the pseudo message information diffusion capability in the chain network according to the present inventionF(i) And (5) a variation graph.
FIG. 4 is a diagram of the difference D between different eta values and true message information diffusion capability in a double-chain network according to the present inventionT(i) And (5) a variation graph.
FIG. 5 shows the difference of the false message information diffusion capability at different eta values of the double-chain network according to the present inventionValue DF(i) And (5) a variation graph.
Detailed Description
The following detailed description of embodiments of the invention is provided in connection with the accompanying drawings.
Referring to fig. 1 to 5, the invention discloses a social layering model implementation method based on network information flow, and selects a chain network and a double-chain network as experimental networks. The network is simple in structure, but has the representative effect of helping researchers to better understand the intelligent nodes and understand the social layering phenomenon based on the intelligent social network information flow. Setting the number of chain network nodes N chain10, cycle number Mchain10000 ═ 10000; the double-chain network is formed by randomly selecting two nodes to be connected by two chain networks, and the cycle number is 10000 times; propagation probability η ═ 0.3,0.5, 0.7,0.9]。
In this embodiment, a social layering model implementation method based on an intelligent social network includes the following specific steps:
s1: the import network set G ═ (V, E, W), and its node set and connected edge set are V ═ { V, respectively1,v2,...,vnAnd
Figure GDA0002825674060000051
a weight set W and a total number N of nodes;
s2: selecting an intelligent node; labeling network nodes, setting the nodes with the label 1 as intelligent nodes, and assuming that the whole network has only 1 intelligent node for researching the training process of the learning method;
s3: initializing the weight; each directed connecting edge in the network is from vjDirection vkAre assigned a fixed constant of 0.5, i.e., wjk0.5. Weight wjkDenotes vkFor vjThe degree of trust of;
s4: and (3) cascading information propagation: and traversing each node of the network in the order of the labels as a source node for information propagation, and issuing true and false messages. If the source node vjFor intelligent nodes, only true messages are published. If the source node vjIs a common node toEqual probability distribution messages or false messages. When a node vkNode v, observing messages from its neighbor nodeskOne of the neighboring neighbor nodes will be chosen at first randomly, denoted as vjThen the cascade information propagation model is as follows:
if v iskIs an intelligent node, if it is a true message, it forwards the message with probability p ═ η, otherwise refuse to issue;
if v iskIs a common node and has the probability p ═ η · w that the message is forwardedjkWhether it is true or false. Eta of 0 to 1 is the natural forwarding rate;
each node has only one opportunity to propagate, and the node which can see the information in the network stops after all the nodes are forwarded and inquired, and the propagation process is recorded as 1 time. After stopping, respectively counting the quantity of forwarding true messages and false messages in the whole network when each node is used as a source node;
s5: calculating indexes of the network social layering model; after the transmission of true and false messages in the whole intelligent social network is completed, by counting the number of forwarded true and false messages, the indexes of the network social hierarchical model can be calculated and are respectively represented by DT(i) And DF(i) And (4) showing. Then, we define the true message information diffusion capability difference value D of the ith nodeT(i) And false message information diffusion capability difference value DF(i) The following are:
DT(i)=nT(i)-nT(i+1),(i≥2) (1)
DF(i)=nF(i)-nF(i+1),(i≥2) (2)
wherein n isT(i) And nF(i) Respectively representing the number of true and false messages forwarded in the whole network when the ith node is taken as a source node;
on the basis, the difference value D of the diffusion capability is spread according to the true message informationT(i) And false message information diffusion capability difference value DF(i) The social layering phenomenon of information flow in the whole intelligent social network can be observed.
Further, in the information concatenation model in step S4, the set of nodes that have forwarded information in the network is denoted as VreachedInitially, only information source nodes are contained; if the neighbor node of the node belongs to VreachedAnd the neighbor nodes of the node are marked as V without forwarding inquirynoworked(ii) a If the neighbor node of the node belongs to VreachedAnd has made forwarding inquiries, the neighbor nodes of the node are marked as Vworked(ii) a After the neighbor node of a certain node k forwards the information, the node can see the information, and the node k forwards the information according to the probability p; setting total cycle times M for each node serving as a source node to issue true and false messages; the process is as follows:
4.1) selecting a common node j in the network as a source node of information propagation, and respectively issuing true and false messages;
4.2) selecting any one of VnoworkedNode k in (1), generates [0,1 ] according to the network information propagation model]If node k is a smart node, if this is a true message and p' ≦ η, the probability that node k will forward the message, otherwise publication is denied. If node k is a normal node and p' ≦ η · wjkThe probability that node k will forward the message regardless of whether the received information is true or false. Eta of 0 to 1 is the natural forwarding rate;
4.3)4.2), if node k forwards the information, add to V the neighbor nodes of node knoworkedIn (3), remove node k out of VnoworkedIs added to Vreached(ii) a If node k does not forward, node k enters Vworked
4.4) when VnoworkedWhen no node exists, the current cycle stops, which indicates that all nodes seeing the information are processed; vreachedI.e., representing the set of nodes propagated to;
4.5) respectively counting the number n of forwarded accumulated true messagesT(j) And the number n of bogus message forwardingsF(j);
4.6) repeating the steps 4.1) -4.5) continuously until the total cycle number M is reached and the propagation stopsAnd finally, calculating the average value of the number of true message forwarding of the final common node
Figure GDA0002825674060000071
And average of the number of bogus message hops
Figure GDA0002825674060000072
4.7) traversing each common node of the network, repeating 4.1) -4.6), and finally obtaining the average value of the number of true messages and the number of false messages forwarded by the whole network when the common nodes are used as source nodes.
FIG. 2 shows that when 0 < eta.ltoreq.1, all have DT(i) Is greater than 0. The method shows a social layering phenomenon, from the intelligent node to the terminal node, the common nodes are close to the intelligent node and have higher probability of transmitting real information, namely the real information can be forwarded by more other common nodes. FIG. 3 shows that
Figure GDA0002825674060000073
When D isF(i) Is greater than 0; when in use
Figure GDA0002825674060000074
When D isF(i) Is less than 0. In other words, a common node v in the middle of the chainm
Figure GDA0002825674060000075
Has the highest capability of propagating error information, and the capability is steadily reduced from the middle to the terminal node, which is less influenced by the intelligent node.
In the double-chain network experiment, a node No. 4 (node No. h) in a chain network A and a node No. 8 (node No. l) in a chain network B are randomly selected to form a double-chain network, and fig. 4 shows that in the chain network A, the social layering phenomenon of the node No. 1 to the node No. 4 in the chain network A is weakened compared with the social layering phenomenon in the chain network, and the social layering phenomenon of the node No. 4 to the node 10 in the chain network A is enhanced; FIG. 5 shows that, in the chain network A, when
Figure GDA0002825674060000076
Or
Figure GDA0002825674060000077
When compared with the social layering phenomenon in the chain network, the social layering phenomenon is strengthened
Figure GDA0002825674060000078
In time, the social layering phenomenon is weakened compared with that in a chain network; double-stranded this phenomenon we define as a cross-border dominance.
As described above for the embodiment introduction of the present invention on the chain network and the double-chain network, we propose a social layering concept based on network information flow, and when there are intelligent nodes in the social network, the social layering phenomenon occurs in the whole social network due to the propagation number of true and false messages. Based on the method, a social layering model implementation method based on intelligent social network information flow is provided, and through combination with simulation experiments, the model can help researchers to better understand the mechanism of social layering in the intelligent social network and the effect of intelligent nodes. The present invention is to be considered as illustrative and not restrictive. It will be understood by those skilled in the art that various changes, modifications and equivalents may be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (2)

1. A social layering model implementation method based on network information flow is characterized by comprising the following steps:
s1: the import network set G ═ (V, E, W), and its node set and connected edge set are V ═ { V, respectively1,v2,...,vnAnd
Figure FDA0002868443760000011
a weight set W and a total number N of nodes;
s2: selecting an intelligent node; labeling network nodes, setting the nodes with the label 1 as intelligent nodes, and assuming that the whole network has only 1 intelligent node for researching the training process of the learning method;
s3: initializing the weight; each directed connecting edge in the network is from vjDirection vkAre assigned a fixed constant of 0.5, i.e., wjk0.5; weight wjkDenotes vkFor vjThe degree of trust of;
s4: propagating the cascade information; traversing each node of the network in the order of the label as a source node of information propagation, and issuing true and false messages; if the source node vjOnly true messages are issued for intelligent nodes; if the source node vjThe node is a common node and issues true messages or false messages with equal probability; when a node vkUpon receiving a message from its neighbor node, node vkOne of the neighboring neighbor nodes will be chosen at first randomly, denoted as vjThen the cascade information propagation model is as follows:
if v iskIs an intelligent node, if the message that the node can receive is a true message, the node vkThe probability p of the message forwarding is equal to eta, otherwise, the message is refused to be issued;
if v iskIs a common node, node vkThe probability p of forwarding the message is eta wjkWhether the message is true or false; eta is the natural forwarding rate, eta is more than or equal to 0 and less than or equal to 1;
each node has only one opportunity transmission, if the transmission is unsuccessful, the transmission is not continued, and when all the nodes which can receive the message in the network are forwarded and inquired, the transmission is stopped and is recorded as a transmission process for 1 time; after stopping, respectively counting the quantity of forwarding true messages and false messages in the whole network when each node is used as a source node;
s5: calculating indexes of the network social layering model; after the transmission of true and false messages in the whole intelligent social network is completed, calculating the indexes of the network social hierarchical model by counting the number of the forwarded true and false messages, wherein the indexes are respectively represented by DT(i) And DF(i) Represents; then, defining the true message information diffusion capability difference value D of the ith nodeT(i) And fake message information diffusion capabilityDifference value DF(i) The following are:
DT(i)=nT(i)-nT(i+1),(i≥2) (1)
DF(i)=nF(i)-nF(i+1),(i≥2) (2)
wherein n isT(i) And nF(i) Respectively representing the number of true and false messages forwarded in the whole network when the ith node is taken as a source node;
on the basis, the difference value D of the diffusion capability is spread according to the true message informationT(i) And false message information diffusion capability difference value DF(i) The social layering phenomenon of information flow in the whole intelligent social network can be observed.
2. The method as claimed in claim 1, wherein the step S4 is implemented by using a cascading information propagation model, where a set of nodes that have forwarded a message in the network is denoted as VreachedInitially, only information source nodes are contained; if the neighbor node of the node belongs to VreachedAnd the neighbor node does not make forwarding inquiry, and the neighbor node of the node is marked as Vnoworked(ii) a If the neighbor node of the node belongs to VreachedAnd the neighbor node has made forwarding inquiry, the neighbor node of the node is marked as Vworked(ii) a After the neighbor node of a certain node k forwards the message, the node k can receive the message, and simultaneously the node k forwards the message according to the probability p; setting total cycle times M for each node serving as a source node to issue true and false messages; the process is as follows:
4.1) selecting a common node j in the network as a source node of information propagation, and respectively issuing true and false messages;
4.2) selecting any one of VnoworkedNode k in (1), generates [0,1 ] according to the network information propagation model]If the node k is an intelligent node, if the message received by the node k is a true message and p ' is less than or equal to η, the probability p ' that the node k forwards the message is p ', otherwise, the message is rejected; if node k is a normal node and p' ≦ η · wjkThe probability p ═ p' that node k forwards the message, regardless of whether the message is true or false; eta is the natural forwarding rate, eta is more than or equal to 0 and less than or equal to 1;
4.3)4.2), if node k forwards the message, add to V in the neighbor node of node knoworkedIn (3), remove node k out of VnoworkedIs added to Vreached(ii) a If node k does not forward, node k enters Vworked
4.4) when VnoworkedWhen there is no node, the current cycle stops, which indicates that all nodes receiving the message have been processed; vreachedI.e., representing the set of nodes propagated to;
4.5) separately counting the number of forwarded accumulated true messages to nT(j) And number of bogus message forwards to nF(j);
4.6) continuously repeating the steps 4.1) -4.5) until the total cycle number M is reached, stopping the propagation, and calculating the average value of the true message forwarding number of the final common node
Figure FDA0002868443760000031
And average of the number of bogus message hops
Figure FDA0002868443760000032
4.7) traversing each common node of the network, repeating 4.1) -4.6), and finally obtaining the average value of the number of true messages and the number of false messages forwarded by the whole network when the common nodes are used as source nodes.
CN201810017429.XA 2018-01-09 2018-01-09 A Realization Method of Social Hierarchy Model Based on Network Information Flow Active CN108400883B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810017429.XA CN108400883B (en) 2018-01-09 2018-01-09 A Realization Method of Social Hierarchy Model Based on Network Information Flow

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810017429.XA CN108400883B (en) 2018-01-09 2018-01-09 A Realization Method of Social Hierarchy Model Based on Network Information Flow

Publications (2)

Publication Number Publication Date
CN108400883A CN108400883A (en) 2018-08-14
CN108400883B true CN108400883B (en) 2021-04-06

Family

ID=63093562

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810017429.XA Active CN108400883B (en) 2018-01-09 2018-01-09 A Realization Method of Social Hierarchy Model Based on Network Information Flow

Country Status (1)

Country Link
CN (1) CN108400883B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110190999B (en) * 2019-06-05 2021-05-28 西安交通大学 A method for measuring network information dissemination ability based on node energy model

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106972952B (en) * 2017-02-28 2020-02-21 浙江工业大学 A method for extracting leader nodes of information dissemination based on network degree correlation
CN106992966B (en) * 2017-02-28 2020-01-10 浙江工业大学 Network information transmission implementation method for true and false messages

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
微博网络仿真及信息传播模型研究;郭莉;《中国优秀硕士学位论文全文数据库(电子期刊)》;20160115;全文 *
社交网络中的信息与影响力传播模式研究;孙凌;《中国博士学位论文全文数据库(电子期刊)》;20170615;全文 *

Also Published As

Publication number Publication date
CN108400883A (en) 2018-08-14

Similar Documents

Publication Publication Date Title
Dong et al. Dynamics of public opinions in an online and offline social network
Zhang et al. Least cost influence maximization across multiple social networks
Wang et al. Beh-Raft-Chain: a behavior-based fast blockchain protocol for complex networks
CN105956184B (en) Collaborative and organized junk information issue the recognition methods of group in a kind of microblogging community network
Banno et al. Designing overlay networks for handling exhaust data in a distributed topic-based pub/sub architecture
Zhu et al. Information dissemination model for social media with constant updates
CN108334953B (en) A social network trust learning method based on weight update
CN108667717A (en) Block chain processing method, medium, device and computing device based on instant communication message record
CN114462624B (en) Method for developing trusted federation learning based on blockchain
CN111222705B (en) A nonlinear charging vehicle path optimization method
CN111047316A (en) Tamper-resistant intelligent block chain system and implementation method
CN108400883B (en) A Realization Method of Social Hierarchy Model Based on Network Information Flow
CN113392429A (en) Block chain-based power distribution Internet of things data safety protection method and device
Li et al. An effective reliability evaluation method for power communication network based on community structure
CN113946708A (en) Topic propagation prediction method based on image restoration technology and rumor splitting information
Mahini et al. GaMe‐PLive: a new game theoretic mechanism for P2P live video streaming
Peng et al. TOFDS: A two-stage task execution method for fake news in digital twin-empowered socio-cyber world
Vijayalakshmi et al. Artificial immune based hybrid GA for QoS based multicast routing in large scale networks (AISMR)
Filippov et al. Online protest mobilization: building a computational model
CN109410078A (en) A kind of information propagation prediction method for the mobile social networking shared suitable for object oriented file
CN115883578A (en) A 5G power network node trust management method based on blockchain technology
Zhao et al. Social-aware cross-chain authentication strategy in mobile edge computing
Liu et al. Community discovery in weighted networks based on the similarity of common neighbors
Wang et al. A new genetic-based rumor diffusion model for social networks
CN111262828A (en) A Node Deployment Method for Network True and False News Propagation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant