Using media related user profiles to personalize multimedia access over social networks

Author(s):  
Lemonia Argyriou ◽  
Charalampos Z. Patrikakis ◽  
Stuart CM Porter ◽  
NIkolaos Papaoulakis ◽  
Christina Androulaki
2019 ◽  
pp. 29-43
Author(s):  
Anastasiya A. Korepanova ◽  
◽  
Valerii D. Oliseenko ◽  
Maxim V. Abramov ◽  
Alexander L. Tulupyev ◽  
...  

The article describes the approach to solving the problem of comparing user profiles of different social networks and identifying those that belong to one person. An appropriate method is proposed based on a comparison of the social environment and the values of account profile attributes in two different social networks. The results of applying various machine learning models to solving this problem are compared. The novelty of the approach lies in the proposed new combination of various methods and application to new social networks. The practical significance of the study is to automate the process of determining the ownership of profiles in various social networks to one user. These results can be applied in the task of constructing a meta-profile of a user of an information system for the subsequent construction of a profile of his vulnerabilities, as well as in other studies devoted to social networks.


2019 ◽  
Vol 68 (2) ◽  
pp. 43-57
Author(s):  
Michał Zabielski ◽  
Zbigniew Tarapata ◽  
Rafał Kasprzyk

The paper presents a method, based on graph and network theory, which allows to detect cloned user profiles on Online Social Networks. Moreover, an idea of similarity containers, which gives an opportunity to incorporate importance and context of data into a model, was introduced. The presented solutions were adapted to the idea of simulation environment, which will allow to detect a profile cloning process before that activity will be completely performed by an attacker. Keywords: Online Social Networks, user profile cloning, violation of privacy on the web.


2021 ◽  
Vol 38 (1) ◽  
pp. 1-11
Author(s):  
Hafzullah İş ◽  
Taner Tuncer

It is highly important to detect malicious account interaction in social networks with regard to political, social and economic aspects. This paper analyzed the profile structure of social media users using their data interactions. A total of 10 parameters including diameter, density, reciprocity, centrality and modularity were used to comprehensively characterize the interactions of Twitter users. Moreover, a new data set was formed by visualizing the data obtained with these parameters. User profiles were classified using Convolutional Neural Network models with deep learning. Users were divided into active, passive and malicious classes. Success rates for the algorithms used in the classification were estimated based on the hyper parameters and application platforms. The best model had a success rate of 98.67%. The methodology demonstrated that Twitter user profiles can be classified successfully through user interaction-based parameters. It is expected that this paper will contribute to published literature in terms of behavioral analysis and the determination of malicious accounts in social networks.


Author(s):  
Artem Feshchenko ◽  
Viacheslav Goiko ◽  
Galina Mozhaeva ◽  
Konstantin Shilyaev ◽  
Andrey Stepanenko

2017 ◽  
Vol 2 (4) ◽  
pp. 333 ◽  
Author(s):  
Hussein Hazimeh ◽  
Elena Mugellini ◽  
Omar Abou Khaled ◽  
Philippe Cudré Mauroux

Sign in / Sign up

Export Citation Format

Share Document