English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 110944/141864 (78%)
Visitors : 48072149      Online Users : 193
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 資訊學院 > 資訊科學系 > 學位論文 >  Item 140.119/136957
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/136957


    Title: 系統化評估矩陣分解於社群媒體之假帳號偵測
    Systematic Evaluation of Matrix Factorization for Social Media Fake Profile Detection
    Authors: 陳靖淮
    Chen, Ching-Huai
    Contributors: 沈錳坤
    Shan, Man-Kwan
    陳靖淮
    Chen, Ching-Huai
    Keywords: 假帳號偵測
    社群媒體
    矩陣分解
    Fake Profile Detection
    Social Media
    Matrix Factorization
    Date: 2021
    Issue Date: 2021-09-02 16:50:42 (UTC+8)
    Abstract: 網際網路的興盛,帶動了社群媒體的蓬勃發展。Web 2.0 讓人們可以分享資訊到網際網路上帶來大量的資訊以及資訊來源。
    然而,龐大的資訊量及資訊來源大幅增加辨別真偽的難度,導致更多不實的資訊出現造成社會危害,如疫情期間的錯誤訊息,讓民眾對於疫情可能做出錯誤的決定。而不實的資訊大都由 Malicious Accounts 所散布。
    每個社群媒體上的帳號皆有自己的 Profile。Malicious Accounts多由電腦自動操控,因此產生的Profiles多是偽造的,也就是 Fake Profiles。常見的社群媒體Profile包括Demographic Data及 Psychographic Data。研究指出電腦利用Psychographic Data 中的喜好預測Profile的結果比其朋友更精準。
    雖然現已有研究利用 Matrix Factorization 偵測 Bipartite Graph上的Anomalies,但是 Fake Profiles 與這些 Anomalies 目標不同。Fake Profiles目標在偽裝身份下達成特定惡意的行為像是帶風向。
    本論文的研究目的在針對 Profile 中的喜好,系統化地評估 Matrix Factorization 偵測 Fake Profiles 的效果。首先我們人工合成五種不同類型的 Fakes,並將他們與我們由 Facebook Crawl 的 Profiles合併,最後我們以實驗評估Matrix Factorization 演算法偵測不同類型 Fake Profiles的效果。
    The rapid growth of the Internet triggers the rise of social media. People shares information over social media. However, much fake information spread over social media. One example is the fake information during the pandemic that mislead people to make wrong decisions.
    Most of the fake information is spread by fake accounts. Most fake accounts are operated by social bots and create fake profiles automatically. On social media each account has its own profile. In general, social media profile includes of demographic data and psychographic data. One of the important psychographic data is the preference information. For example, on Facebook, the pages liked by a user indicate the user’s preference.
    The relationships between the users and the liked pages can be represented by bipartite graph. There exists research on anomaly detection in bipartite graph using matrix factorization. However, the objective of the fake profile is to disguise its identity in order to manipulate public opinion without being detected which is different from that of the ordinary anomaly in bipartite graph.
    This thesis focuses on preference profiles and aims to systematically evaluate the performance of matrix factorization on fake profile detection. We propose five types of fakes, inject the synthesized fake profiles into real profiles crawled from Facebook crawler and performed the experiments to evaluate the effectiveness of the matrix factorization algorithm.
    Reference: [1] S. Adali and J. Golbeck, Predicting Personality with Social Behavior, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2012.
    [2] F. Ahmed and M. Abulaish, An Mcl-Based Approach for Spam Profile Detection in Online Social Networks, IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012.
    [3] L. Akoglu, H. Tong and D. Koutra, Graph Based Aanomaly Detection and Description: A Survey, Data Mining and Knowledge Discovery, vol. 29, no. 3, 2015.
    [4] R. Albright, J. Cox, D. Duling, A. N. Langville and C. Meyer, Algorithms, Initializations, and Convergence for the Nonnegative Matrix Factorization, 2006.
    [5] M. Bilal, A. Gani, M. I. U. Lali, M. Marjani and N. Malik, Social Profiling: A Review, Taxonomy, and Challenges, Cyberpsychology, Behavior, and Social Networking, vol. 22, no. 7, 2019.
    [6] A. ElAzab, Fake Accounts Detection in Twitter Based on Minimum Weighted Feature, World 2016.
    [7] G. Farnadi, S. Zoghbi, M.-F. Moens and M. De Cock, Recognising Personality Traits Using Facebook Status Updates, Seventh International AAAI Conference on Weblogs and Social Media, 2013.
    [8] J. Golbeck, C. Robles, M. Edmondson and K. Turner, Predicting Personality from Twitter, IEEE Third International Conference on Privacy, Security, Risk and Trust and IEEE Third International Conference on Social Computing, 2011.
    [9] I. Gunes, C. Kaleli, A. Bilge and H. Polat, Shilling Attacks against Recommender Systems: A Comprehensive Survey, Artificial Intelligence Review, vol. 42, no. 4, 2014.
    [10] I. Guy, N. Zwerdling, I. Ronen, D. Carmel and E. Uziel, Social Media Recommendation Based on People and Tags, Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, 2010.
    [11] R. A. Hanneman and M. Riddle, Introduction to Social Network Methods, University of California Riverside, 2005.
    [12] S. Joshi, H. G. Nagariya, N. Dhanotiya and S. Jain, Identifying Fake Profile in Online Social Network: An Overview and Survey, International Conference on Machine Learning, Image Processing, Network Security and Data Sciences, 2020.
    [13] R. Kareem and W. Bhaya, Fake Profiles Types of Online Social Networks: A Survey, International Journal of Engineering & Technology, vol. 7, no. 4.19, 2018.
    [14] G. F. Khan, B. Swar and S. K. Lee, Social Media Risks and Benefits: A Public Sector Perspective, Social Science Computer Review, vol. 32, no. 5, 2014.
    [15] Y. Koren, R. Bell and C. Volinsky, Matrix Factorization Techniques for Recommender Systems, Computer, vol. 42, no. 8, 2009.
    [16] L. Liu, D. Preotiuc-Pietro, Z. R. Samani, M. E. Moghaddam and L. Ungar, Analyzing Personality through Social Media Profile Picture Choice, Tenth International AAAI Conference on Web and Social Media, 2016.
    [17] D. Markovikj, S. Gievska, M. Kosinski and D. J. Stillwell, Mining Facebook Data for Predictive Personality Modeling, Seventh International AAAI Conference on Weblogs and Social Media, 2013.
    [18] J. W. Pennebaker, M. E. Francis and R. J. Booth, Linguistic Inquiry and Word Count: Liwc 2001, Mahway: Lawrence Erlbaum Associates, vol. 71, no. 2001, 2001.
    [19] P. Savyan and S. M. S. Bhanu, Behaviour Profiling of Reactions in Facebook Posts for Anomaly Detection, 2017 Ninth International Conference on Advanced Computing (ICoAC), 2017.
    [20] K. Shu, A. Sliva, S. Wang, J. Tang and H. Liu, Fake News Detection on Social Media: A Data Mining Perspective, ACM SIGKDD Explorations Newsletter, vol. 19, no. 1, 2017.
    [21] T. Stein, E. Chen and K. Mangla, Facebook Immune System, Proceedings of the 4th Workshop on Social Network Systems, 2011.
    [22] H. Tong and C.-Y. Lin, Non-Negative Residual Matrix Factorization with Application to Graph Anomaly Detection, Proceedings of the 2011 SIAM International Conference on Data Mining, 2011.
    [23] Y. Wu, M. Kosinski and D. Stillwell, Computer-Based Personality Judgments Are More Accurate Than Those Made by Humans, Proceedings of the National Academy of Sciences, vol. 112, no. 4, 2015.
    [24] Z. Yang, Q. Sun and B. Zhang, Evaluating Prediction Error for Anomaly Detection by Exploiting Matrix Factorization in Rating Systems, IEEE Access, vol. 6 2018.
    [25] Z. Zhang, T. Li, C. Ding and X. Zhang, Binary Matrix Factorization with Applications, Seventh IEEE International Conference on Data Mining, 2007.
    [26] W. X. Zhao, S. Li, Y. He, L. Wang, J.-R. Wen and X. Li, Exploring Demographic Information in Social Media for Product Recommendation, Knowledge and Information Systems, vol. 49, no. 1, 2016.
    Description: 碩士
    國立政治大學
    資訊科學系
    105753034
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0105753034
    Data Type: thesis
    DOI: 10.6814/NCCU202101306
    Appears in Collections:[資訊科學系] 學位論文

    Files in This Item:

    File Description SizeFormat
    303401.pdf2865KbAdobe PDF20View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback