RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • Identifying Topic-Sensitive Influential Spreaders in Social Networks

        Donghao Zhou,Wenbao Han,Yongjun Wang 보안공학연구지원센터 2015 International Journal of Hybrid Information Techno Vol.8 No.2

        Identifying influential spreaders is an important issue in understanding the dynamics of information diffusion in social networks. It is to find a small subset of nodes, which can spread the information or influence to the largest number of nodes. The conventional approaches consider information diffusion through the network in a coarse-grained manner, without taking into account the topical features of information content and users. However, for messages with different topics, the target influential spreaders may vary largely. In this paper, we propose to harness historical propagation data to learn the information diffusion probabilities on topic-level, based on which we use a greedy algorithm to iteratively select a set of influential nodes for a given topic. Specially, we design a three-stage algorithm named TopicRank to mine the most influential spreaders with respect to a specific topic. Given observed propagation data, we first use Latent Dirichlet Allocation (LDA) model to learn a topic mixture for each propagation message. Then, the topic-level diffusion probability of an edge is computed by exploiting the propagation actions occurred to it and the topic distribution of these propagation messages. Last, based on the learned topic-level diffusion probabilities, we apply optimized greedy algorithm CLEF to identify influential nodes with respect to a specific topic. Experimental results show that our method significantly outperforms state-of-the-art methods when used for topic-sensitive information spread maximization.

      • Exploiting Historical Diffusion Data to Maximize Information Spread in Social Networks

        Donghao Zhou,Wenbao Han,Yongjun Wang 보안공학연구지원센터 2015 International Journal of Database Theory and Appli Vol.8 No.2

        Information spread maximization is to find a small subset of nodes in social network such that they can maximize the expected spread of information. In this paper, we attempt harnessing historical information cascades data to learn how information propagates in social networks and how to maximize its spread. In particular, we proposed a voting algorithm to learn diffusion probabilities of edges from cascades data. Then a pruning method is developed to remove trivial edges whose weights are smaller than a threshold. Moreover, motivated by the social influence locality, we propose a Local Influence Model to evaluate node's influence within a local area instead of the whole network, which can effectively reduce the computational complexity. Based on Local Influence Model, we use greedy algorithm to find an approximate optimal solution. Experimental results show that our method significantly outperforms state-of-the-art models both in terms of information spread and algorithm runtime.

      • KCI등재

        A novel ID-based multi-domain handover protocol for mesh points in WMNs

        ( Xue Zhang ),( Guangsong Li ),( Wenbao Han ),( Huifang Ji ) 한국인터넷정보학회 2015 KSII Transactions on Internet and Information Syst Vol.9 No.7

        Wireless mesh networks (WMNs) provide an efficient and flexible method to the field of wireless networking, but also bring many security issues. A mesh point may lose all of its available links during its movement. Thus, the mesh point needs to handover to a new mesh point in order to obtain access to the network again. For multi-domain WMNs, we proposed a new ID-based signcryption scheme and accordingly present a novel ID-based handover protocol for mesh points. The mutual authentication and key establishment of two mesh points which belong to different trust domains can be achieved by using a single one-round message exchange during the authentication phase. The authentication server is not involved in our handover authentication protocol so that mutual authentication can be completed directly by the mesh points. Meanwhile, the data transmitted between the two mesh points can be carried by the authentication messages. Moreover, there are no restrictions on the PKG system parameters in our proposed multi-domain ID-based signcryption scheme so our handover scheme can be easily applied to real WMNs circumstances. Security of the signcryption scheme is proved in the random oracle model. It shows that our protocol satisfies the basic security requirements and is resistant to existing attacks based on the security of the signcryption. The analysis of the performance demonstrates that the protocol is efficient and suitable for the multi-domain WMNs environment.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼