[1] |
Tsikerdekis M.Identity deception prevention using common contribution network data[J].Information Forensics and Security,2017,12(1):188-199.
|
[2] |
Liu Kan,Yuan Yun-ying,Liu Ping,et al.A weibo bot-users indentification model based on random forest [J].Acta Scientiarum Naturalium Universitatis Pekinensis,2015,51(2):289-300.(in Chinese)
|
[3] |
Zhang C, Niu K, He Z Q. Dynamic detection of spammers in Weibo[C]∥Proc of 2014 4th IEEE International Confe- rence on Network Infrastructure and Digital Content, 2014:112-116.
|
[4] |
Zedeh L A. Knowledge representation in fuzzy logic[J]. IEEE Transactions on Knowledge and Data Engineering, 1989, 1(1): 89-100.
|
[5] |
Ruspini E H. Possibility as similarity: The semantics of fuzzy logic[C]∥Proc of the 6th Annual Conference on Uncertainty in Artificial Intelligence, 2013:271-280.
|
[6] |
Dunn J C. A fuzzy relative of the ISODATA process and its use in detecting compact well-separated clusters[J]. Journal of Cybernetics, 1973,3(3):32-57.
|
[7] |
Do Q N,Hussain F K, Bang T N.A fuzzy approach to detect spammer groups[C]∥Proc of IEEE International Conference on Fuzzy Systems,2017:1-6.
|
[8] |
Pinandito A,Perdana R S,Saputra M C,et al.Spam detection framework for Android Twitter application using Nave Bayes and K-nearest neighbor classifiers[C]∥Proc of International Conference on Software and Computer Applications,2017:77-82.
|
[9] |
Xu G X,Hu M X,Ma C,et al.GSCPM:CPM-based group spamming detection in online product reviews[C]∥Proc of 2019 IEEE International Conference on Communications,2019:1-6.
|
[10] |
Xiao Jin-qi, Wang Jun-feng. Malware variant clustering method based on fuzzy hash[J].Journal of Sichuan University (Natural Science Edition),2018,55(3):51-58.(in Chinese)
|
[11] |
Sedhai S,Sun A.Semi-supervised spam detection in Twitter stream[J].IEEE Transactions on Computational Social Systems,2018,5(1):169-175.
|
[12] |
Santosh K C,Maity S K,Mukherjee A,et al.ENWalk:Learning network features for spam detection in Twitter[J].arXiv:1704.03404,2017.
|
[13] |
Nasurudeen A N. Detecting spammers on social networks[J].International Journal of Engineering Research,2017,6(2):14-31.
|
[14] |
Iqbal W,Erradi A,Mahmood A. Dynamic workload patterns prediction for proactive auto-scaling of web applications[J].Journal of Network and Computer Applications,2018,124:94-107.
|
[15] |
Ioannis T,Giorgos B,Pavlos K,et al.A greedy feature selection algorithm for big data of high dimensionality[J].Machine Learning,2018,108(2):149-202.
|
[16] |
Huang Y Z, Huang J B, Zhou Y M,et al.Temporal changes in water quality parameters of two sections of the ancient canal:A case of a reach for yangnong chemical plant[J].International Journal of Environmental Monitoring and Analysis,2018,6(3):71-76.
|
[17] |
Li Fu-min, Tong ling-ling,Du Cui-lan,et al. Weibo users credibility evalution based on user relationships[J].Journal of Computer Applications,2017,37(3):654-659.(in Chinese)
|
[18] |
Topol E J.High-performance medicine:The convergence of human and artificial intelligence[J].Nature Medicine,2019,25(1):44-56.
|
|
附中文参考文献:
|
[2] |
刘勘,袁蕴英,刘萍,等.基于随机森林分类的微博机器用户识别研究[J].北京大学学报(自然科学版),2015,51(2):289-300.
|
[10] |
肖锦琦,王俊峰.基于模糊哈希特征表示的恶意软件聚类方法[J].四川大学学报(自然科学版),2018,55(3):51-58.
|
[17] |
李付民,佟玲玲,杜翠兰,等.基于关联关系的微博用户可信度分析方法[J].计算机应用,2017,37(3):654-569.
|