[1] |
周玉晶,沈嘉荟,邱海韬,等. 基于复杂网络的社交媒体内容安全可视化分析系统[J]. 信息网络安全,2016(9):158-162.
|
[2] |
PEROZZI B, AL-RFOU R, SKIENA S.Deepwalk: Online Learning of Social Representations[C]//ACM. 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 24-27, 2014, New York, USA. New York: ACM, 2014:701-710.
|
[3] |
刘奇飞. 基于兴趣的微博用户关系分析原型系统研究[J]. 信息网络安全,2016(9):240-245.
|
[4] |
GROVER A, LESKOVEC J.Node2vec: Scalable Feature Learning for Networks[C]//ACM. 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 13-17, 2016, San Francisco, California, USA. New York: ACM, 2016: 855-864.
|
[5] |
CAO Shaosheng, LU Wei, XU Qiongkai.Deep Neural Networks for Learning Graph Representations[C]//ACM. 13th AAAI Conference on Artificial Intelligence, February 12-17, 2016, Phoenix, Arizona. New York: Acm, 2016: 1145-1152.
|
[6] |
任浩,罗森林,潘丽敏,等. 基于图结构的文本表示方法研究[J]. 信息网络安全,2017(3):46-52.
|
[7] |
赵姝,刘晓曼,段震,等. 社交关系挖掘研究综述[J]. 计算机学报,2017(3):535-553.
|
[8] |
GONG N Z, LIU Bin. You are Who You Know and How You Behave: Attribute Inference Attacks via Users’ Social Friends and Behaviors[EB/OL]. , 2017-5-11.
|
[9] |
LU Linyuan, ZHOU Tao.Link Prediction in Complex Networks: A Survey[J]. Physica A: Statistical Mechanics and Its Applications, 2011(6): 1150-1170.
|
[10] |
NG A Y, JORDAN M I, WEISS Y.On Spectral Clustering: Analysis and an Algorithm[C]//ACM. 14th International Conference on Neural Information Processing Systems: Natural and Synthetic, December 3-8, 2001, Vancouver, British Columbia, Canada. New York: 2001: 849-856.
|
[11] |
CHANDOLA V, BANERJEE A, KUMAR V.Anomaly Detection: A Survey[J]. ACM Computing Surveys, 2009, 41(3): 1-15.
|
[12] |
BHUYAN M H, BHATTACHARYYA D K, KALITA J K.Network Anomaly Detection: Methods, Systems and Tools[J]. IEEE Communications Surveys & Tutorials, 2014, 16(1): 303-336.
|