Modeling Multi-factor Sequential User Behavior Data over Social Networks

被引:2
|
作者
Wang Peng [1 ,2 ,3 ]
Zhang Peng [2 ]
Zhou Chuang [2 ]
Guo Li [2 ]
Fang Binxing [2 ]
Yang Tao [4 ]
机构
[1] Chinese Acad Sci, Inst Comp Technol, Beijing 100190, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing 100089, Peoples R China
[3] Beijing Univ Posts & Telecommun, Beijing 100876, Peoples R China
[4] China Informat Technol Secur Evaluat Ctr, Beijing 100085, Peoples R China
关键词
Malicious user detection; User behavior; Social networks; Bayesian model; Social influence;
D O I
10.1049/cje.2016.03.025
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Modeling dynamic user behavior over online social networks not only helps us understand user behavior patterns on social networks, but also improves the performance of behavior analysis tasks. Time-varying user behavior is commonly influenced by multiple factors: user habit, social influence and external events. Existing works either consider only a part of these factors, or fail to model the dynamics behind user behavior. Thus, they cannot precisely model the user behavior. We present a generative Bayesian model HES to model dynamic user behavior data. We take the influential factors and user's selection process as separate latent variables, based on which we can recover the evolving patterns underneath user behavior data sequences. Empirical results on large-scale social networks show that the proposed approach outperforms existing user behavior prediction models by at least 8% w.r.t. prediction accuracy. Our work also unveils some interesting insights underneath social behavior data.
引用
收藏
页码:364 / 371
页数:8
相关论文
共 50 条
  • [1] Modeling Multi-factor Sequential User Behavior Data over Social Networks
    WANG Peng
    ZHANG Peng
    ZHOU Chuan
    GUO Li
    FANG Binxing
    YANG Tao
    Chinese Journal of Electronics, 2016, 25 (02) : 364 - 371
  • [2] Modeling Multi-factor and Multi-faceted Preferences over Sequential Networks for Next Item Recommendation
    Du, Yingpeng
    Liu, Hongzhi
    Wu, Zhonghai
    MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES, ECML PKDD 2021: RESEARCH TRACK, PT II, 2021, 12976 : 516 - 531
  • [3] User identity authentication and identification based on multi-factor behavior features
    Ding, Xing
    Peng, Changgen
    Ding, Hongfa
    Wang, Maoni
    Yang, Hui
    Yu, Qinyong
    2019 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2019,
  • [4] Multi-factor User Authentication Scheme for Multi-gateway Wireless Sensor Networks
    Wang C.-Y.
    Wang D.
    Wang F.-F.
    Xu G.-A.
    Jisuanji Xuebao/Chinese Journal of Computers, 2020, 43 (04): : 683 - 700
  • [5] DRL: A Multi-factor Mobility Model in Mobile Social Networks
    Jing, Tao
    Zhang, Yating
    Li, Zhen
    Huo, Yan
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (02) : 1693 - 1711
  • [6] DRL: A Multi-factor Mobility Model in Mobile Social Networks
    Tao Jing
    Yating Zhang
    Zhen Li
    Yan Huo
    Wireless Personal Communications, 2017, 95 : 1693 - 1711
  • [7] Multi-Factor Authentication Modeling
    Dostalek, Libor
    2019 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER INFORMATION TECHNOLOGIES (ACIT'2019), 2019, : 443 - 446
  • [8] A Multi-factor QoE Model for Adaptive Streaming over Mobile Networks
    Tran, Huyen T. T.
    Nam Pham Ngoc
    Pham, Anh T.
    Truong Cong Thang
    2016 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2016,
  • [9] Modeling Social Networks through User Background and Behavior
    Foudalis, Ilias
    Jain, Kamal
    Papadimitriou, Christos
    Sideri, Martha
    ALGORITHMS AND MODELS FOR THE WEB GRAPH, 2011, 6732 : 85 - 102
  • [10] Resource allocation with multi-factor node ranking in data center networks
    Li, Xiaoling
    Wang, Huaimin
    Ding, Bo
    Li, Xiaoyong
    Feng, Dawei
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 32 : 1 - 12