WEKO3
アイテム
{"_buckets": {"deposit": "3d8da322-9d95-489f-acad-9ce760980e55"}, "_deposit": {"created_by": 18, "id": "10374", "owners": [18], "pid": {"revision_id": 0, "type": "depid", "value": "10374"}, "status": "published"}, "_oai": {"id": "oai:muroran-it.repo.nii.ac.jp:00010374", "sets": ["46", "352"]}, "author_link": ["58227", "39157", "58228", "58229", "58230", "58226"], "item_79_biblio_info_10": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2019", "bibliographicIssueDateType": "Issued"}, "bibliographicIssueNumber": "5", "bibliographicPageEnd": "1402", "bibliographicPageStart": "1385", "bibliographicVolumeNumber": "12", "bibliographic_titles": [{"bibliographic_title": "PEER-TO-PEER NETWORKING AND APPLICATIONS", "bibliographic_titleLang": "en"}]}]}, "item_79_description_23": {"attribute_name": "フォーマット", "attribute_value_mlt": [{"subitem_description": "application/pdf", "subitem_description_type": "Other"}]}, "item_79_description_7": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "Graph-based approaches for fake account detection is one of the important means to fight against fake accounts\u0027 attacks on social networks. With the growth of the scale of social networks, more and more researchers begin to use the graph computing framework to boost their detection algorithms. We make detailed analyses of social networks\u0027 graph data and state-of-the-art graph computing frameworks, and find that some techniques of the current graph computing systems are overgeneralized and suboptimal, which means they only focus on how to design a graph processing framework on general graphs but miss the optimization of social networks graphs. So, in this paper we propose QuickSquad, a graph computing system on a single server which is specific to the optimization of social networks graph structures. QuickSquad uses the method of \"divide and rule\" instead of overgeneralization. First, we divide the graph structure data into the heavy set and the light set according to the out-degree of vertices. Then, we 1) store them with different formats, 2) process them with edge-based updating and vertex-based updating appropriately in a two-phase processing model, 3) apply two selective scheduler strategies of different level, i.e. vertex-level and file-level, and 4) provide four cache priorities when the memory is not enough to cache all data. Finally, we implement two detection methods, dSybilRank and dCOLOR, on our system, and the experiments demonstrate that our system can increase the performance up to 5.91X (from 1.14X) compared with the performance of the current graph computing systems, like GridGraph.", "subitem_description_language": "en", "subitem_description_type": "Abstract"}]}, "item_79_link_17": {"attribute_name": "出版者版へのリンク", "attribute_value_mlt": [{"subitem_link_text": "10.1007/s12083-018-0697-2", "subitem_link_url": "https://doi.org/10.1007/s12083-018-0697-2"}]}, "item_79_link_5": {"attribute_name": "室蘭工業大学研究者データベースへのリンク", "attribute_value_mlt": [{"subitem_link_text": "董 冕雄(DONG Mianxiong)", "subitem_link_url": "http://rdsoran.muroran-it.ac.jp/html/100000145_ja.html"}]}, "item_79_publisher_11": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "SPRINGER", "subitem_publisher_language": "en"}]}, "item_79_relation_18": {"attribute_name": "DOI", "attribute_value_mlt": [{"subitem_relation_type": "isVersionOf", "subitem_relation_type_id": {"subitem_relation_type_id_text": "10.1007/s12083-018-0697-2", "subitem_relation_type_select": "DOI"}}]}, "item_79_rights_19": {"attribute_name": "権利", "attribute_value_mlt": [{"subitem_rights": "This is a post-peer-review, pre-copyedit version of an article published in QuickSquad: A new single-machine graph computing framework for detecting fake accounts in large-scale social networks. The final authenticated version is available online at: http://dx.doi.org/10.1007/s12083-018-0697-2", "subitem_rights_language": "en"}]}, "item_79_source_id_12": {"attribute_name": "ISSN", "attribute_value_mlt": [{"subitem_source_identifier": "1936-6442", "subitem_source_identifier_type": "PISSN"}]}, "item_79_subject_9": {"attribute_name": "日本十進分類法", "attribute_value_mlt": [{"subitem_subject": "007", "subitem_subject_scheme": "NDC"}]}, "item_79_text_4": {"attribute_name": "著者ID(非表示)", "attribute_value_mlt": [{"subitem_text_value": "1000020728274"}]}, "item_79_version_type_21": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_ab4af688f83e57aa", "subitem_version_type": "AM"}]}, "item_access_right": {"attribute_name": "アクセス権", "attribute_value_mlt": [{"subitem_access_right": "open access", "subitem_access_right_uri": "http://purl.org/coar/access_right/c_abf2"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "JIANG, Xinyang", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "58226", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "LI, Qiang", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "58227", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "MA, Zhen", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "58228", "nameIdentifierScheme": "WEKO"}]}, {"creatorAffiliations": [{"affiliationNameIdentifiers": [{"affiliationNameIdentifier": "10103", "affiliationNameIdentifierScheme": "kakenhi"}], "affiliationNames": [{"affiliationName": "室蘭工業大学", "affiliationNameLang": "ja"}, {"affiliationName": "Muroran Institute of Technology", "affiliationNameLang": "en"}]}], "creatorNames": [{"creatorName": "DONG, Mianxiong", "creatorNameLang": "en"}, {"creatorName": "トウ, メンユウ", "creatorNameLang": "ja-Kana"}, {"creatorName": "董, 冕雄", "creatorNameLang": "ja"}], "familyNames": [{"familyName": "DONG", "familyNameLang": "en"}, {"familyName": "トウ", "familyNameLang": "ja-Kana"}, {"familyName": "董", "familyNameLang": "ja"}], "givenNames": [{"givenName": " Mianxiong", "givenNameLang": "en"}, {"givenName": "メンユウ", "givenNameLang": "ja-Kana"}, {"givenName": "冕雄", "givenNameLang": "ja"}], "nameIdentifiers": [{"nameIdentifier": "39157", "nameIdentifierScheme": "WEKO"}, {"nameIdentifier": "1000020728274", "nameIdentifierScheme": "NRID", "nameIdentifierURI": "https://nrid.nii.ac.jp/ja/nrid/1000020728274"}]}, {"creatorNames": [{"creatorName": "WU, Jun", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "58229", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "GUO, Dong", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "58230", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2020-11-18"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "PPNA_2019_12_1385_1402.pdf", "filesize": [{"value": "2.5 MB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_note", "mimetype": "application/pdf", "size": 2500000.0, "url": {"label": "PPNA_2019_12_1385_1402", "objectType": "fulltext", "url": "https://muroran-it.repo.nii.ac.jp/record/10374/files/PPNA_2019_12_1385_1402.pdf"}, "version_id": "858b57e4-b50f-4bcd-9b77-7a59424daf83"}]}, "item_keyword": {"attribute_name": "キーワード", "attribute_value_mlt": [{"subitem_subject": "Security of online social networks", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Fake accounts", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Sybil detection", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Graph computing", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Distributed system", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "journal article", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_title": "QuickSquad: A new single-machine graph computing framework for detecting fake accounts in large-scale social networks", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "QuickSquad: A new single-machine graph computing framework for detecting fake accounts in large-scale social networks", "subitem_title_language": "en"}]}, "item_type_id": "79", "owner": "18", "path": ["46", "352"], "permalink_uri": "http://hdl.handle.net/10258/00010315", "pubdate": {"attribute_name": "PubDate", "attribute_value": "2020-11-18"}, "publish_date": "2020-11-18", "publish_status": "0", "recid": "10374", "relation": {}, "relation_version_is_last": true, "title": ["QuickSquad: A new single-machine graph computing framework for detecting fake accounts in large-scale social networks"], "weko_shared_id": -1}
QuickSquad: A new single-machine graph computing framework for detecting fake accounts in large-scale social networks
http://hdl.handle.net/10258/00010315
http://hdl.handle.net/10258/00010315936441cf-8447-4eba-b02a-337e53d730ad
名前 / ファイル | ライセンス | アクション |
---|---|---|
PPNA_2019_12_1385_1402 (2.5 MB)
|
|
Item type | 学術雑誌論文 / Journal Article.(1) | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
公開日 | 2020-11-18 | |||||||||||
タイトル | ||||||||||||
言語 | en | |||||||||||
タイトル | QuickSquad: A new single-machine graph computing framework for detecting fake accounts in large-scale social networks | |||||||||||
言語 | ||||||||||||
言語 | eng | |||||||||||
キーワード | ||||||||||||
言語 | en | |||||||||||
主題Scheme | Other | |||||||||||
主題 | Security of online social networks | |||||||||||
キーワード | ||||||||||||
言語 | en | |||||||||||
主題Scheme | Other | |||||||||||
主題 | Fake accounts | |||||||||||
キーワード | ||||||||||||
言語 | en | |||||||||||
主題Scheme | Other | |||||||||||
主題 | Sybil detection | |||||||||||
キーワード | ||||||||||||
言語 | en | |||||||||||
主題Scheme | Other | |||||||||||
主題 | Graph computing | |||||||||||
キーワード | ||||||||||||
言語 | en | |||||||||||
主題Scheme | Other | |||||||||||
主題 | Distributed system | |||||||||||
資源タイプ | ||||||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||||||||
資源タイプ | journal article | |||||||||||
アクセス権 | ||||||||||||
アクセス権 | open access | |||||||||||
アクセス権URI | http://purl.org/coar/access_right/c_abf2 | |||||||||||
著者 |
JIANG, Xinyang
× JIANG, Xinyang× LI, Qiang× MA, Zhen× 董, 冕雄
WEKO
39157
× WU, Jun× GUO, Dong |
|||||||||||
室蘭工業大学研究者データベースへのリンク | ||||||||||||
董 冕雄(DONG Mianxiong) | ||||||||||||
http://rdsoran.muroran-it.ac.jp/html/100000145_ja.html | ||||||||||||
抄録 | ||||||||||||
内容記述タイプ | Abstract | |||||||||||
内容記述 | Graph-based approaches for fake account detection is one of the important means to fight against fake accounts' attacks on social networks. With the growth of the scale of social networks, more and more researchers begin to use the graph computing framework to boost their detection algorithms. We make detailed analyses of social networks' graph data and state-of-the-art graph computing frameworks, and find that some techniques of the current graph computing systems are overgeneralized and suboptimal, which means they only focus on how to design a graph processing framework on general graphs but miss the optimization of social networks graphs. So, in this paper we propose QuickSquad, a graph computing system on a single server which is specific to the optimization of social networks graph structures. QuickSquad uses the method of "divide and rule" instead of overgeneralization. First, we divide the graph structure data into the heavy set and the light set according to the out-degree of vertices. Then, we 1) store them with different formats, 2) process them with edge-based updating and vertex-based updating appropriately in a two-phase processing model, 3) apply two selective scheduler strategies of different level, i.e. vertex-level and file-level, and 4) provide four cache priorities when the memory is not enough to cache all data. Finally, we implement two detection methods, dSybilRank and dCOLOR, on our system, and the experiments demonstrate that our system can increase the performance up to 5.91X (from 1.14X) compared with the performance of the current graph computing systems, like GridGraph. | |||||||||||
言語 | en | |||||||||||
書誌情報 |
en : PEER-TO-PEER NETWORKING AND APPLICATIONS 巻 12, 号 5, p. 1385-1402, 発行日 2019 |
|||||||||||
出版者 | ||||||||||||
言語 | en | |||||||||||
出版者 | SPRINGER | |||||||||||
出版者版へのリンク | ||||||||||||
10.1007/s12083-018-0697-2 | ||||||||||||
https://doi.org/10.1007/s12083-018-0697-2 | ||||||||||||
DOI | ||||||||||||
関連タイプ | isVersionOf | |||||||||||
識別子タイプ | DOI | |||||||||||
関連識別子 | 10.1007/s12083-018-0697-2 | |||||||||||
日本十進分類法 | ||||||||||||
主題Scheme | NDC | |||||||||||
主題 | 007 | |||||||||||
ISSN | ||||||||||||
収録物識別子タイプ | PISSN | |||||||||||
収録物識別子 | 1936-6442 | |||||||||||
権利 | ||||||||||||
言語 | en | |||||||||||
権利情報 | This is a post-peer-review, pre-copyedit version of an article published in QuickSquad: A new single-machine graph computing framework for detecting fake accounts in large-scale social networks. The final authenticated version is available online at: http://dx.doi.org/10.1007/s12083-018-0697-2 | |||||||||||
著者版フラグ | ||||||||||||
出版タイプ | AM | |||||||||||
出版タイプResource | http://purl.org/coar/version/c_ab4af688f83e57aa | |||||||||||
フォーマット | ||||||||||||
内容記述タイプ | Other | |||||||||||
内容記述 | application/pdf |