[Objective] This paper modifies the Dempster-Shafer evidence theory, aiming to identify untrusted Sina Weibo (Microblog) users with subjective uncertainties. [Methods] Firstly, we used the evidence distance to improve the original Dempster-Shafer evidence theory. Then, we transformed the credibility of historical posts into evidence, which was also merged to generate users’ trust interval. Finally, we identified untrusted users with the Decision Tree algorithm and the trust interval. [Results] Compared with the existing methods, our new model reduced the processing time by 287.4 seconds, increased the value by 31.9 percentage point, and received an optimal Chi-Square value of the consistency test. [Limitations] We only investigated the subjective uncertainties due to time decay and evidence conflict, and need to add the impacts of cognitive differences on subjective degrees. [Conclusions] The proposed method could effectively identify untrusted users from Sina Weibo.
(Cyberspace Administration of China. Regulations on Ecological Governance of Network Information Content[EB/OL]. [2022-10-31]. http://www.cac.gov.cn/2019-12/20/c_1578375159509309.htm. )
[2]
Yu Z D, Yu H Q. Untrusted User Detection in Microblogs[C]// Proceedings of the 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, 2014: 558-564.
[3]
Dempster A P. Upper and Lower Probabilities Induced by a Multivalued Mapping[J]. The Annals of Mathematical Statistics, 1967, 38(2): 325-339.
doi: 10.1214/aoms/1177698950
[4]
Erşahin B, Aktaş Ö, Kılınç D, et al. Twitter Fake Account Detection[C]// Proceedings of the 2017 International Conference on Computer Science and Engineering(UBMK). IEEE, 2017: 388-392.
[5]
Wu Y H, Fang Y Z, Shang S K, et al. A Novel Framework for Detecting Social Bots with Deep Neural Networks and Active Learning[J]. Knowledge-Based Systems, 2021, 211: 106525.
doi: 10.1016/j.knosys.2020.106525
(Liang Xiaohe, Tian Ruya, Wu Lei, et al. Microblog Similarity Based on Super Network and Its Application in Microblog Public Opinion Topic Detection[J]. Library and Information Service, 2020, 64(11): 77-86.)
doi: 10.13266/j.issn.0252-3116.2020.11.009
[7]
Mccord M, Chuah M. Spam Detection on Twitter Using Traditional Classifiers[C]// Proceedings of the 8th International Conference on Autonomic and Trusted Computing. Springer, 2011: 175-186.
(Chen Huimin, Jin Sichen, Lin Wei, et al. Quantitative Analysis on the Communication of COVID-19 Related Social Media Rumors[J]. Journal of Computer Research and Development, 2021, 58(7): 1366-1384.)
[9]
Jr Barbon S, Campos G F C, Tavares G M, et al. Detection of Human, Legitimate Bot, and Malicious Bot in Online Social Networks Based on Wavelets[J]. ACM Transactions on Multimedia Computing, Communications, and Applications, 2018, 14(1s): Article No.26.
(He Peng, Wu Hao, Zeng Cheng, et al. Truser: An Approach to Service Recommendation Based on Trusted Users[J]. Chinese Journal of Computers, 2019, 42(4): 851-863.)
[12]
Alsmadi I, O’rien M J. How Many Bots in Russian Troll Tweets?[J]. Information Processing & Management, 2020, 57(6): 102303.
doi: 10.1016/j.ipm.2020.102303
[13]
Gupta A, Lamba H, Kumaraguru P. $1.00 per RT #BostonMarathon #PrayForBoston:Analyzing Fake Content on Twitter[C]// Proceedings of the 2013 APWG eCrime Researchers Summit. IEEE, 2013: 1-12.
[14]
Kagan D M, Elovichi Y, Fire M. Generic Anomalous Vertices Detection Utilizing a Link Prediction Algorithm[J]. Social Network Analysis and Mining, 2018, 8(1): 1-13.
doi: 10.1007/s13278-017-0479-5
(Wang Dan, Zhang Haitao, Liu Yashu, et al. Sentiment Analysis and Ideological Guidance of Key Nodes in Micro-Blog Public Opinion[J]. Library and Information Service, 2019, 63(4): 15-22.)
doi: 10.13266/j.issn.0252-3116.2019.04.002
(Tan Kan, Gao Min, Li Wentao, et al. Two-Layer Sampling Active Learning Algorithm for Social Spammer Detection[J]. Acta Automatica Sinica, 2017, 43(3): 448-461.)
[17]
Shafer G A. A Mathematical Theory of Evidence[J]. Technometrics, 1978, 20(1): 106.
[18]
Zadeh L A. A Simple View of the Dempster-Shafer Theory of Evidence and Its Implication for the Rule of Combination[J]. AI Magazine, 1986, 7(2):85-90.
[19]
Murphy C K. Combining Belief Functions When Evidence Conflicts[J]. Decision Support Systems, 2000, 29(1): 1-9.
doi: 10.1016/S0167-9236(99)00084-6
[20]
Yager R R. On the Dempster-Shafer Framework and New Combination Rules[J]. Information Sciences, 1987, 41(2): 93-137.
doi: 10.1016/0020-0255(87)90007-7
(Xu Peng, Lin Sen. Internet Traffic Classification Using C4.5 Decision Tree[J]. Journal of Software, 2009, 20(10): 2692-2704.)
doi: 10.3724/SP.J.1001.2009.03444
(Shen Wang, Dai Wang, Gao Xueqian, et al. Research on Credibility Evaluation Method of Social Network Users Based on Multigraph—Perspective on Cyberbullying and Privacy Disclosure[J]. Journal of Modern Information, 2020, 40(8): 27-37.)
doi: 10.3969/j.issn.1008-0821.2020.08.004
Ming Yiyang, Liu Xiaojie. Sensitive Information Detection Based on Phrase-Level Sentiment Analysis[J]. Journal of Sichuan University(Natural Science Edition), 2019, 56(6): 1042-1048.)
(Fu Cong, Yu Dunhui, Zhang Lingli. Study on Identification Method for Change Form of Chinese Sensitive Words[J]. Application Research of Computers, 2019, 36(4): 988-991.)
(Ma Chao. Study on the Categories and Structure of Health Rumor Denials Community: From the Perspective of Rumor Cooperative Governance[J]. Journal of Intelligence, 2019, 38(1): 96-105.)
(Sun Chenchen, Shen Derong, Shan Jing, et al. WSR: A Semantic Relatedness Measure Based on Wikipedia Structure[J]. Chinese Journal of Computers, 2012, 35(11): 2361-2370.)
doi: 10.3724/SP.J.1016.2012.02361
(Lu Wenxing, Liang Changyong, Ding Yong. A Method Determining the Objective Weights of Experts Based on Evidence Distance[J]. Chinese Journal of Management Science, 2008, 16(6): 95-99.)
[31]
Jousselme A L, Grenier D, Bossé É. A New Distance Between Two Bodies of Evidence[J]. Information Fusion, 2001, 2(2): 91-101.
doi: 10.1016/S1566-2535(01)00026-4
(Bi Wenhao, Zhang An, Li Chong. Weighted Evidence Combination Method Based on New Evidence Conflict Measurement Approach[J]. Control and Decision, 2016, 31(1): 73-78.)
(Wu Jianyun, Xu Mingzhu. Video Personalized Recommendation Based on User Profile and Video Interest Tags[J]. Information Science, 2021, 39(1): 128-134.)
(Li Ye, Wang Yagang, Xu Xiaoming. Research on Convergence and Conflict Treatment in Evidence Fusion[J]. Systems Engineering and Electronics, 2012, 34(6): 1113-1119.)
(Wu Bao, Chi Renyong. A Trusted Measurement Method for Social Network Users That Integrates Sentiment Analysis and User Popularity[J]. Journal of Systems Science and Mathematical Sciences, 2021, 41(4): 1091-1107.)
doi: 10.12341/jssms20251
(Lai Maosheng, Wang Lin, Li Yuning. Survey and Analysis of the Frontiers in Information Science[J]. Library and Information Service, 2008, 52(3): 6-10.)
[37]
Li K H, Huang Z, Cheng Y C, et al. A Maximal Figure-of-Merit Learning Approach to Maximizing Mean Average Precision with Deep Neural Network Based Classifiers[C]// Proceedings of the 2014 IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE, 2014: 4503-4507.