Netinfo Security ›› 2024, Vol. 24 ›› Issue (11): 1665-1674.doi: 10.3969/j.issn.1671-1122.2024.11.006
Previous Articles Next Articles
XIA Lingling1,2, MA Zhuo1,2(), GUO Xiangmin1,2, NI Xueli1,2
Received:
2024-08-06
Online:
2024-11-10
Published:
2024-11-21
CLC Number:
XIA Lingling, MA Zhuo, GUO Xiangmin, NI Xueli. Target Personnel Importance Ranking Algorithm Based on Improved Weighted LeaderRank[J]. Netinfo Security, 2024, 24(11): 1665-1674.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2024.11.006
话单属性 | 话单属性(英文) | 属性值(*号标识0~9数字) |
---|---|---|
主被叫标志(呼叫方向) | Direction | 主叫/被叫 |
事件发生地(电话区号) | Location | 南京市 |
本方号码(手机号) | S_tel | 130******** |
IMEI码(手机串号) | IMEI | 8671********** |
本方号码归属地 | S_attribution | **市 |
位置区标识码 | PIC | 133** |
小区标识码 | CI | 213** |
基站经度 | Longitude | 117.77*** |
基站纬度 | Latitude | 34.***** |
通话开始时间 | Stime | 2018-12-25 13:40:27 |
通话时长(s) | Seconds | 12 |
对方号码(手机号) | T_tel | 138******** |
对方号码归属地 | T_attribution | 南京市 |
基站名称 | Basestation | NJ_GL_HW_***村电信_G_C_G |
排名 | 手机号 | 改进的加权LeaderRank算法分值 | 度中心性 算法分值 | 接近中心性 算法分值 | 介数中心性 算法分值 |
---|---|---|---|---|---|
1 | 5873 | 0.99399817 | 0.24 | 0.61199456 | 0.062003609 |
2 | 9536 | 0.95835223 | 0.08 | 0.60517637 | 0.173175853 |
3 | 13033 | 0.93085113 | 0.12 | 0.55886427 | 0.101986866 |
4 | 4756 | 0.91614471 | 0.16 | 0.5653326 | 0.040812103 |
5 | 8160 | 0.85990686 | 0.12 | 0.57709771 | 0.052809148 |
6 | 1661 | 0.83528273 | 0.08 | 0.56015409 | 0.035128633 |
7 | 7538 | 0.81830179 | 0.12 | 0.51734709 | 0.020954698 |
8 | 11111 | 0.80784825 | 0.08 | 0.53974379 | 0.038104458 |
9 | 8830 | 0.79455319 | 0.12 | 0.48719124 | 0.037361958 |
10 | 13854 | 0.77905092 | 0.08 | 0.52598724 | 0.023063675 |
11 | 3032 | 0.74990686 | 0.12 | 0.44447684 | 0.057778143 |
12 | 2783 | 0.67528273 | 0.08 | 0.51489453 | 0.021622982 |
13 | 4612 | 0.65830179 | 0.12 | 0.47076744 | 0.024140619 |
14 | 5038 | 0.65784825 | 0.12 | 0.42557669 | 0.063028967 |
15 | 8994 | 0.64455319 | 0.12 | 0.4321969 | 0.055034893 |
16 | 4050 | 0.62905092 | 0.08 | 0.47425952 | 0.022367555 |
17 | 4328 | 0.62225499 | 0.04 | 0.47776641 | 0.058674394 |
18 | 4245 | 0.61651752 | 0.04 | 0.51734709 | 0.014568814 |
19 | 3933 | 0.61490806 | 0.08 | 0.46729007 | 0.011531529 |
20 | 7531 | 0.60860566 | 0.04 | 0.50394516 | 0.014492739 |
[1] | MITHOO P, KUMAR M. Social Network Analysis for Crime Rate Detection Using Spizella Swarm Optimization Based BiLSTM Classifier[EB/OL]. (2023-06-07)[2024-07-14]. https://doi.org/10.1016/j.knosys.2023.110450. |
[2] | ISLAM S R, PAL M. Further Development of F-Index for Fuzzy Graph and Its Application in Indian Railway Crime[J]. Journal of Applied Mathematics and Computing, 2023, 69(1): 321-353. |
[3] |
XIAO Jia, ZHOU Xiaolu. Crime Exposure along My Way Home: Estimating Crime Risk along Personal Trajectory by Visual Analytics[J]. Geographical Analysis, 2020, 52(1): 49-68.
doi: 10.1111/gean.12187 |
[4] | KREBS V. Mapping Networks of Terrorist Cells[J]. Connections, 2002, 24(3): 43-52. |
[5] | SPARROW M K. The Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects[J]. Social Networks, 1991, 13(3): 251-274. |
[6] | COLES N. It’s Not What You Know-It’s Who You Know that Counts Analysing Serious Crime Groups as Social Networks[J]. The British Journal of Criminology, 2001, 41(4): 580-594. |
[7] | KLERKS P. The Network Paradigm Applied to Criminal Organizations: Theoretical Nitpicking or a Relevant Doctrine for Investigators? Recent Developments in the Netherlands[J]. Connections, 2001, 24(3): 53-65. |
[8] | WILLIAMS P. Transnational Criminal Networks[M]. California: RAND Corporation, 2001. |
[9] | XIONG Wanduan, CHONG Wangyu. Research on the Application of Social Network Data Mining Technology in Crime Analysis and Prevention[J]. Applied Mathematics and Nonlinear Sciences, 2024, 9(1): 1-12. |
[10] | GARRIDO S L E, MONROY V C A, BERMUDEZ R L C. Police Network Analysis Applied to Street Crime Control in Bogotá[J]. Revista de Economía Institucional, 2024, 26(50): 145-173. |
[11] |
YANG Lili, YANG Yongchuan. Crime Organization Relation Mining Based on Social Network[J]. Computer Engineering, 2009, 35(15): 91-93.
doi: 10.3969/j.issn.1000-3428.2009.15.031 |
杨莉莉, 杨永川. 基于社会网络的犯罪组织关系挖掘[J]. 计算机工程, 2009, 35(15):91-93.
doi: 10.3969/j.issn.1000-3428.2009.15.031 |
|
[12] | GAO Jianqiang, TAN Jian, CUI Yongfa. One Social Network Clique Analysis Model Based on Communication Trace[J]. Computer Applications and Software, 2012, 29(3): 206-208. |
高建强, 谭剑, 崔永发. 一种基于通讯痕迹的社会网络团伙分析模型[J]. 计算机应用与软件, 2012, 29(3):206-208. | |
[13] | LI Wanbiao, YU Zhi, GONG Junfeng, et al. An Approach of Crime Network Analysis Based on Association Data Model[J]. Acta Scientiarum Naturalium Universitatis Sunyatseni, 2014, 53(5): 1-7. |
李万彪, 余志, 龚峻峰, 等. 基于关系数据模型的犯罪网络挖掘研究[J]. 中山大学学报(自然科学版), 2014, 53(5):1-7. | |
[14] | JIANG Wenrong, WU Haomin. Research on Identification Method of Recessive Drug Addicts Based on Activity Behavior[J]. Intelligent Building, 2017(6): 78-80. |
蒋文荣, 吴昊旻. 基于活动行为的隐性吸毒人员识别方法研究[J]. 智能建筑, 2017(6):78-80. | |
[15] | PAN Xiao, WANG Binjun. Research on Criminal Gang Discovery Algorithm Based on Social Networks[J]. Software Guide, 2018, 17(12): 77-80. |
潘潇, 王斌君. 基于社交网络的犯罪团伙发现算法研究[J]. 软件导刊, 2018, 17(12):77-80. | |
[16] |
ZHU Guanyu, CHEN Peng. Spatial Evolution and Influencing Factors of Criminals’ Cross-Area Co-Offending Network: An Example of Fraud in Beijing[J]. Progress in Geography, 2020, 39(5): 792-803.
doi: 10.18306/dlkxjz.2020.05.008 |
朱冠宇, 陈鹏. 基于共同犯罪的犯罪人地域关系网络的空间演化及其影响因素:以北京市诈骗案件为例[J]. 地理科学进展, 2020, 39(5):792-803.
doi: 10.18306/dlkxjz.2020.05.008 |
|
[17] | ZHAO Di, CHEN Peng, JIANG Huan, et al. Co-Offending Network and Influencing Factors Based on Offenders’ Regional Characteristics[J]. Geography and Geo-Information Science, 2022, 38(5): 57-64. |
赵迪, 陈鹏, 江欢, 等. 基于犯罪人地域特征的共同犯罪网络及影响因素研究[J]. 地理与地理信息科学, 2022, 38(5):57-64. | |
[18] | CHEN Yawen. Criminal Suspect Discovery Based on Complex Network Analysis[D]. Nanjing: Nanjing University of Aeronautics and Astronautics, 2018. |
陈雅雯. 基于复杂网络分析的犯罪嫌疑人发现[D]. 南京: 南京航空航天大学, 2018. | |
[19] | TONG Haoxin, LIN Jianpeng, LIANG Yunfeng, et al. Analysis Method of Suspect Pursuit and Arrest Based on PageRank Algorith: China, CN201911193387.6[P]. 2020-02-28. |
童昊昕, 林建鹏, 梁云峰, 等. 基于PageRank算法的嫌疑人追逃分析方法:中国,CN110990509B[P]. 2023-02-28. | |
[20] |
SHI Mengyu, ZHOU Yong, XING Yan. Community Detection by Label Propagation with LeaderRank Method[J]. Journal of Computer Applications, 2015, 35(2): 448-451.
doi: 10.11772/j.issn.1001-9081.2015.02.0448 |
石梦雨, 周勇, 邢艳. 基于LeaderRank的标签传播社区发现算法[J]. 计算机应用, 2015, 35(2):448-451.
doi: 10.11772/j.issn.1001-9081.2015.02.0448 |
|
[21] | LÜ Linyuan, CHEN Duanbing, REN Xiaolong, et al. Vital Nodes Identification in Complex Networks[J]. Physics Reports, 2016, 650: 1-63. |
[22] | CHEN Duanbing, LÜ Linyuan, SHANG Mingsheng, et al. Identifying Influential Nodes in Complex Networks[J]. Physica A: Statistical Mechanics and Its Applications, 2012, 391(4): 1777-1787. |
[23] | LÜ Linyuan, ZHANG Yicheng, YEUNG C H, et al. Leaders in Social Networks, the Delicious Case[EB/OL]. (2011-06-27)[2024-07-11]. https://doi.org/10.1371/journal.pone.0021202. |
[24] | BONACICH P. Factoring and Weighting Approaches to Status Scores and Clique Identification[J]. The Journal of Mathematical Sociology, 1972, 2(1): 113-120. |
[25] | FREEMAN L C. Centrality in Social Networks Conceptual Clarification[J]. Social Networks, 1979, 1(3): 215-239. |
[26] | BRIN S, PAGE L. The Anatomy of a Large-Scale Hypertextual Web Search Engine[J]. Computer Networks and ISDN Systems, 1998, 30: 107-117. |
[27] | LI Qian, ZHOU Tao, LÜ Linyuan, et al. Identifying Influential Spreaders by Weighted LeaderRank[J]. Physica A: Statistical Mechanics and Its Applications, 2014, 404: 47-55. |
[1] | YIN Jie, CHEN Pu, YANG Guinian, XIE Wenwei, LIANG Guangjun. Detection of DDoS Attacks in the Internet of Things Based on Artificial Intelligence [J]. Netinfo Security, 2024, 24(11): 1615-1623. |
[2] | LI Pengchao, ZHANG Quantao, HU Yuan. Smart Contract Vulnerability Detection Method Based on Graph Convolutional Network with Dual Attention Mechanism [J]. Netinfo Security, 2024, 24(11): 1624-1631. |
[3] | CHEN Baogang, ZHANG Yi, YAN Song. Research on Multi-Factor Continuous Trustworthy Identity Authentication for Users in Civil Aviation Air Traffic Control Operational Information Systems [J]. Netinfo Security, 2024, 24(11): 1632-1642. |
[4] | LAN Haoliang, WANG Qun, XU Jie, XUE Yishi, ZHANG Bo. Review of Research on Blockchain-Based Federated Learning [J]. Netinfo Security, 2024, 24(11): 1643-1654. |
[5] | ZHANG Zhiqiang, BAO Yadong. Anomaly Traffic Detection Algorithm Integrating RF and CNN [J]. Netinfo Security, 2024, 24(11): 1655-1664. |
[6] | HU Wentao, XU Jingkai, DING Weijie. Unsupervised Network Traffic Anomaly Detection Based on Abductive Learning [J]. Netinfo Security, 2024, 24(11): 1675-1684. |
[7] | MA Zhuo, CHEN Dongzi, HE Jiahan, WANG Qun. Joint Prediction for User and Point of Interest Based on Disentangling Influences [J]. Netinfo Security, 2024, 24(11): 1685-1695. |
[8] | ZHOU Shengli, XU Rui, CHEN Tinggui, JIANG Keyi. Research on the Evolution of Defrauded Network Behavior Risk Based on Eventic Graph [J]. Netinfo Security, 2024, 24(11): 1696-1709. |
[9] | MA Rupo, WANG Qun, YIN Qiang, GAO Gugang. Analysis of Security Risks and Countermeasures for Modbus TCP Protocol [J]. Netinfo Security, 2024, 24(11): 1710-1720. |
[10] | PEI Bingsen, LI Xin, FAN Zhijie, JIANG Zhangtao. Design and Implementation of a Cross-Domain Secure Sharing Transmission Control System for Video Surveillance Data [J]. Netinfo Security, 2024, 24(11): 1721-1730. |
[11] | GU Haiyan, LIU Qi, MA Zhuo, ZHU Tao, QIAN Hanwei. Research on Data Noise Addition Method Based on Availability [J]. Netinfo Security, 2024, 24(11): 1731-1738. |
[12] | ZHANG Peng, LUO Wenhua. Blockchain-Based Log Data Provenance Mechanism Using Bloom Filter Search Tree [J]. Netinfo Security, 2024, 24(11): 1739-1748. |
[13] | LUAN Runsheng, JIANG Ping, SUN Yinxia, ZHANG Qinzhi. The Research and Development of Digital Forensics Technology [J]. Netinfo Security, 2024, 24(11): 1749-1762. |
[14] | GAO Guangliang, LIANG Guangjun, HONG Lei, GAO Gugang, WANG Qun. Disambiguation-Based Partial Multi-Label Learning Algorithm Augmented by Fusing Instance and Label Correlations [J]. Netinfo Security, 2024, 24(11): 1763-1772. |
[15] | QIN Zhenkai, XU Mingchao, JIANG Ping. Research on the Construction Method and Application of Case Knowledge Graph Based on Prompt Learning [J]. Netinfo Security, 2024, 24(11): 1773-1782. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||