[1] |
刘衍珩, 李飞鹏, 孙鑫, 朱建启 . 基于信息传播的社交网络拓扑模型[J]. 通信学报, 2013,34(4): 1-9.
|
|
LIU Y Y , LI F P , SUN X , ZHU J Q . Social network model based on the transmission of information[J]. Journal on Communications, 2013,34(4): 1-9.
|
[2] |
曹玖新, 吴江林, 石伟 ,等. 新浪微博网信息传播分析与预测[J]. 计算机学报, 2014,37(4): 779-790.
|
|
CAO J X , WU J L , SHI W ,et al. Sina microblog information diffusion analysis and prediction[J]. Journal of Computers, 2014,37(4): 779-790.
|
[3] |
杨杰, 李小平, 陈湉 . 基于增量时空轨迹大数据的群体挖掘方法[J]. 计算机研究与发展, 2014(s2): 76-85.
|
|
YANG J , LI X P , CHEN T . A group mining method for incremental spatio-temporal trajectory bigdata[J]. Journal of Computer Research and Development, 2014(s2): 76-85.
|
[4] |
李艳丽, 刘阳, 谢文波 ,等. 大数据发现非法传销网络[J]. 大数据, 2017,3(5): 106-112.
|
|
LI Y L , LIU Y , XIE W P ,et al. Uncovering the illegal pyramid networks by big data[J]. Big Data Research, 2017,3(5): 106-112.
|
[5] |
史殿习, 李寒, 杨若松 ,等. 用户日常频繁行为模式挖掘[J]. 国防科技大学学报, 2017,39(1): 74-80.
|
|
SHI D X , LI H , YANG R S ,et al. Mining user frequent behavior patterns in daily life[J]. Journal of National University of Defense Technology, 2017,39(1): 74-80.
|
[6] |
文雨, 王伟平, 孟丹 . 面向内部威胁检测的用户跨域行为模式挖掘[J]. 计算机学报, 2016,39(8): 1555-1569.
|
|
WEN Y , WANG W P , MENG D . Mining user cross-domain behavior patterns for insider threat detection[J]. Journal of Computer, 2016,39(8): 1555-1569.
|
[7] |
李全刚, 时金桥, 秦志光 ,等. 面向邮件网络事件检测的用户行为模式挖掘[J]. 计算机学报, 2014,37(5): 1135-1146.
|
|
LI Q G , SHI J Q , QIN Z G ,et al. Mining user behavior patterns for event detection in email networks[J]. Journal of Computer, 2014,37(5): 1135-1146.
|
[8] |
郝秀兰, 胡运发, 申倩 . 中文论坛内容监测的方法研究[J]. 中文信息学报, 2012,26(3): 129-137.
|
|
HAO X L , HU Y F , SHEN Q . Research on content monitoring on Chinese web forums[J]. Journal of Chinese Information Processing, 2012,26(3): 129-137.
|
[9] |
AIELLO W , CHUNG F , LU L . A random graph model for power law graphs[J]. Experimental Mathematics, 2001,10(1): 53-66.
|
[10] |
ONNELA J P , SARAM?KI J , HYV?NEN J ,et al. Structure and tie strengths in mobile communication networks[J]. Proceedings of the national academy of sciences, 2007,104(18): 7332-7336.
|
[11] |
JIANG Z Q , XIE W J , LI M X ,et al. Calling patterns in human communication dynamics[J]. Proceedings of the National Academy of Sciences, 2013,110(5): 1600-1605.
|
[12] |
余晓平, 裴韬 . 手机通话网络度特征分析[J]. 物理学报, 2013,62(2): 1-9.
|
|
YU X P , PEI T . Analysis on degree characteristics of mobile call network[J]. Acta Phys Sin, 2013,62(2): 1-9.
|
[13] |
CAPDEVILA J , CERQUIDES J , TORRES J . Recognizing warblers:a probabilistic model for event detection in Twitter[C]. ICML2016 Anomaly Detection Workshop,New York,USA, 2016.
|
[14] |
MANAVOGLU E , PAVLOV D , GILES C L . Probabilistic user behavior models[C]// Proceedings of the Third IEEE International Conference on Data Mining,Melbourne,Florida. 2003: 203-210.
|
[15] |
BEUTEL A . User behavior modeling with large-scale graph analysis[D]. Computer Science Department School of Computer Science Carnegie Mellon University Pittsburgh,PA, 2016.
|
[16] |
XU Z H , ZHANG Y,WU ,et al. Modeling user posting behavior on social media[C]. SIGIR’12,Portland,Oregon,USA. 2012.
|
[17] |
张啸剑, 王淼, 孟小峰 . 差分隐私保护下一种精确挖掘 top-k 频繁模式方法[J]. 计算机研究与发展, 2014,51(1): 104-114.
|
|
ZHANG X J , WANG M , MENG X F . An accurate method for mining top-k frequent pattern under differential privacy[J]. Journal of Computer Research and Development, 2014,51(1): 104-114.
|
[18] |
CUI P , LIU H , AGGARWAL C ,et al. Uncovering and predicting human behaviors[J]. IEEE Intelligent Systems, 2016,03.
|
[19] |
张宇翔, 孙菀, 杨家海 ,等. 新浪微博反垃圾中特征选择的重要性分析[J]. 通信学报, 2016,37(8):2016152-10.
|
|
ZHANG Y X , SUN Y , YANG J H ,et al. Feature importance analysis for spammer detection in Sina Weibo[J]. Journal of Communications, 2016,37(8):2016152-10.
|
[20] |
曹菁华, 胡访宇, 华烨 . 基于电信数据的通话行为模式发现[J]. 计算机仿真, 2014,11(31): 163-167.
|
|
CAO J H , HU F Y , HUA Y . Call behavior pattern discovery based on telecom data[J]. Computer Simulation, 2014,11(31): 163-167.
|
[21] |
OLSZEWSKI D . A probabilistic approach to fraud detection in telecommunications[J]. Knowledge-Based Systems, 2012,26(3): 246-258.
|
[22] |
STEINLEY D . Properties of the hubert-arable adjusted rand index[J]. Psychological methods, 2004,9(3): 386.
|