Network Embedding Technology Based on Breadth Learning for Information Extraction and Review in Social Media
DOI:
https://doi.org/10.31449/inf.v48i19.6544Abstract
Social media platforms have brought tremendous changes to the way society communicates and transmits information, but there are also some extreme individuals who post sensitive information such as false, malicious attacks, terrorism or negative comments. To address this rapidly evolving network security challenge, this study introduces breadth learning and network embedding techniques from machine learning to establish a new method for information extraction and auditing. This method adopts a meta path random walk form to extract and filter effective information from multiple heterogeneous social networks, and then proposes a network embedding technique based on breadth learning to transform each node into a low dimensional feature space. Finally, a fusion function is designed to quantify the correlation between sensitive users on social platforms, accurately identifying sensitive information publishers from multiple social platforms and effectively locking in sensitive information. As a result, a sensitive information extraction and review model based on breadth learning and network embedding is constructed. The results showed that the research model had a testing accuracy of 97.3% in mixed datasets on social platforms, which was better than other sensitive information review models, and performed better on social platforms with larger data volumes. The research results have significant implications for the network security governance of open large-scale social media platforms.Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika