Skip to main content

Recognition of Spam Microblog for TV Program Evaluation Under Mircoblog Platform

  • Conference paper
  • First Online:
Bio-Inspired Computing -- Theories and Applications (BIC-TA 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 562))

Included in the following conference series:

  • 1870 Accesses

Abstract

Aimed at the serious problem of the microblog platform used in the field of evaluating TV program that is badly affected by spam microblog, this paper proposes a recognition method about combination of lexicon match with SVM based on pattern matching and machine learning. At the same time, considering the impact that spam information caused in the public-opinion-trend and topic-attention-degree, it is important to identify the spam microblog correctly. They are various cleaning modes for different spam information. And the results of experiment shows that the total-recognition-rate has already reached 80 %. This method is useful for the following text mining.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mo, Q., Yang, K.: Study on network navy recognition. Softw. J. 07, 1505–1526 (2014)

    Google Scholar 

  2. Liu, H., Zhao, Y., Qin, B., Liu, T.: Comment target extraction and sentiment classification. J. Chin. Inf. Process. 24(1), 84–88 (2010)

    Google Scholar 

  3. Jindal, N., Liu, B., Lim, E.P.: Finding Unusual Review Patterns Using Unexpected Rules. ACM Press, New York (2010)

    Book  Google Scholar 

  4. Wang, G., Xie, S., Liu, B., Yu, P.S.: Review graph based online store review spammer detection. In: Proceedings of the 2011 IEEE 11th International Conference on Data Mining, pp. 1242–1247 (2011)

    Google Scholar 

  5. Song, T., Pan, L., Păun, Gh: Asynchronous spiking neural P systems with local synchronization. Inf. Sci. 219, 197–207 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  6. Zhang, L., Zhu, J., Yao, T.: An evaluation of statistical spam filtering techniques. Asian Lang. Inf. Process. 3(4), 243–269 (2004)

    Article  Google Scholar 

  7. Cortes, C., Vapnik, V.: Support vector machine. Mach. Learn. 20(3), 273–297 (1995)

    MATH  Google Scholar 

  8. Platt, J.: Sequential minimal optimization: a fast algorithm for training support vector or machines. In: Advances in Kernel Methods-Support Vector Learning. MIT Press (1998)

    Google Scholar 

  9. Yu, R., Liu, C., Jin, X., Wang, Y., Cheng, X.: Chinese spam filtering based on multi angle of feature fusion. J. Shandong Univ. 11, 53–58 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xinran Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yin, F., Wang, X., Wang, Y., Chai, J. (2015). Recognition of Spam Microblog for TV Program Evaluation Under Mircoblog Platform. In: Gong, M., Linqiang, P., Tao, S., Tang, K., Zhang, X. (eds) Bio-Inspired Computing -- Theories and Applications. BIC-TA 2015. Communications in Computer and Information Science, vol 562. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-49014-3_50

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-49014-3_50

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-49013-6

  • Online ISBN: 978-3-662-49014-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics