* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Document
Survey
Document related concepts
Transcript
Cross-Platform Identification of Anonymous Identical Users in Multiple Social MediaNetworks Abstract: • Many types of social networking sites have emerged and contributed immensely to large volumes of real-world data on social behaviors. • Recognizing anonymous, yet identical users among multiple SMNs is still an intractable problem . Moreover, since online SMNs are quite symmetric, existing user identification schemes based on network structure are not effective . • In this proposed To predict the unwanted message shared person from the Social media networks. • In this we use joint link attribute algorithm. JLA considered both profile attributes and network properties. We also developed two propositions to improve the efficiency of the algorithm. Results of extensive experiments demonstrate that FRUI performs much better than current network structure-based algorithms. Existing System: • In Existing FRUI (Friend Relationship-Based User Identification (FRUI) algorithm used to identify the Anonymous user in social media networks. • FRUI calculates a match degree for all candidate User Matched Pairs (UMPs), and only UMPs with top ranks are considered as identical users. It need two propositions to improve the efficiency of the algorithm. Disadvantages: • It is less Efficient. • It will not identify all identical users . Proposed System: • Identifying anonymous users across multiple SMNs is challenging work. Therefore, only a portion of identical users with different nicknames can be recognized with this method. In this system use a approach to developed for identify all identical users with different nicknames. • user identification methods can be applied simultaneously to examine multiple SMN platforms. • We proposed the concept to block the anonymous users who send repeateadly unwanted messages.to predict the anonymous users from the data set then block the user from the social media network. • To address this problem, proposed an approach based on conditional random fields called Joint Link-Attribute (JLA). JLA considered both profile attributes and network properties. Advantages: System Requirements: • Hardware Requirements: System : Pentium IV 2.4 GHz. Hard Disk : 160 GB. Floppy Drive : 1.44 Mb. Monitor : 15 VGA Color. Mouse : Logitech. RAM : 2GB. • Software Requirements: Operating system: Windows XP. Front End : C# Back End : SQL Server2012 References: Wikipedia, "Twitter, " http://en.wikipedia.org/wiki/Twitter. 2014. Xinhuanet, "Sina Microblog Achieves over 500 Million Users,"http://news.xinhuanet.com/tech/2012-02/29/c_122769084.htm.2014. D. Perito, C. Castelluccia, M.A. Kaafar, and P. Manils, "How unique and traceable are usernames?," Privacy Enhancing Technologies (PETS’11), pp. 1-17, 2011. J. Liu, F. Zhang, X. Song, Y.I. Song, C.Y. Lin, and H.W. Hon,"What's in a name?: an unsupervised approach to link users across communities," Proc. of the 6th ACM international conference on Web search and data mining(WDM’13), pp. 495-504, 2013. R. Zafarani and H. Liu, "Connecting corresponding identities across communities," Proc. of the 3rd International ICWSM Conference, pp. 354357, 2009. R. Zafarani and H. Liu, "Connecting users across social media sites: a behavioral-modeling approach, " Proc. of the 19th ACM SIGKDD International Conference Knowledge Discovery and Data Mining (KDD’13), pp.41-49, 2013. A. Acquisti, R. Gross and F. Stutzman, "Privacy in the age of augmented reality," Proc. National Academy of Sciences, 2011.