2023
DOI: 10.3390/electronics12071686
|View full text |Cite
|
Sign up to set email alerts
|

Transformer-Based User Alignment Model across Social Networks

Abstract: Cross-social network user identification refers to finding users with the same identity in multiple social networks, which is widely used in the cross-network recommendation, link prediction, personality recommendation, and data mining. At present, the traditional method is to obtain network structure information from neighboring nodes through graph convolution, and embed social networks into the low-dimensional vector space. However, as the network depth increases, the effect of the model will decrease. There… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 25 publications
0
1
0
Order By: Relevance
“…Deeplink [5], mentioned above, also uses neural networks to optimize its representation. And more neural network-based embedding approaches, including Graph Convolutional Networks, Graph Attention Networks, GraphSage, and so on, have been applied to UIL models like in [12][13][14]. (3) Random-walk-based embedding approach.…”
Section: Related Workmentioning
confidence: 99%
“…Deeplink [5], mentioned above, also uses neural networks to optimize its representation. And more neural network-based embedding approaches, including Graph Convolutional Networks, Graph Attention Networks, GraphSage, and so on, have been applied to UIL models like in [12][13][14]. (3) Random-walk-based embedding approach.…”
Section: Related Workmentioning
confidence: 99%
“…The core logic of identifying users across social networks is based on the assumption that, if two nodes belonging to different social networks exhibit similar attribute characteristics and close topological structures, then, these two accounts are very likely to belong to the same real-world user [19]. Given the difficulty in directly obtaining node attributes, studies commonly generate users' feature vectors through random initialization methods and, then, based on the connections between users, calculate structural similarity to identify the same user across different social networks [20,21].…”
Section: Model Buildingmentioning
confidence: 99%
“…The calculation formula for this evaluation metric is as described in Formula (18), where UnMappedAnchors (i,j) represents the number of seed node links that were not successfully matched, including both correct and incorrect matches, RightNodes (i,j) @α refers to the number of seed node links that were correctly matched. Further, the specific expression of this evaluation metric can be referred to in Formula (19), where N represents the total number of networks:…”
Section: Semi-oversightmentioning
confidence: 99%