Modeling Multi-factor Sequential User Behavior Data over Social Networks

被引:2
|
作者
Wang Peng [1 ,2 ,3 ]
Zhang Peng [2 ]
Zhou Chuang [2 ]
Guo Li [2 ]
Fang Binxing [2 ]
Yang Tao [4 ]
机构
[1] Chinese Acad Sci, Inst Comp Technol, Beijing 100190, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing 100089, Peoples R China
[3] Beijing Univ Posts & Telecommun, Beijing 100876, Peoples R China
[4] China Informat Technol Secur Evaluat Ctr, Beijing 100085, Peoples R China
关键词
Malicious user detection; User behavior; Social networks; Bayesian model; Social influence;
D O I
10.1049/cje.2016.03.025
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Modeling dynamic user behavior over online social networks not only helps us understand user behavior patterns on social networks, but also improves the performance of behavior analysis tasks. Time-varying user behavior is commonly influenced by multiple factors: user habit, social influence and external events. Existing works either consider only a part of these factors, or fail to model the dynamics behind user behavior. Thus, they cannot precisely model the user behavior. We present a generative Bayesian model HES to model dynamic user behavior data. We take the influential factors and user's selection process as separate latent variables, based on which we can recover the evolving patterns underneath user behavior data sequences. Empirical results on large-scale social networks show that the proposed approach outperforms existing user behavior prediction models by at least 8% w.r.t. prediction accuracy. Our work also unveils some interesting insights underneath social behavior data.
引用
收藏
页码:364 / 371
页数:8
相关论文
共 50 条
  • [21] User Behavior Modeling Research Based on Group Level in Social Networks
    Feng, Xie
    Zuo, Wanli
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON EDUCATION TECHNOLOGY, MANAGEMENT AND HUMANITIES SCIENCE (ETMHS 2015), 2015, 27 : 1388 - 1391
  • [22] EXPLORATORY INQUIRY INTO MULTI-FACTOR THEORY OF MORAL BEHAVIOR
    LEMING, JS
    JOURNAL OF MORAL EDUCATION, 1976, 5 (02) : 179 - 188
  • [23] Access Control Mechanism for Multi User Data Sharing in Social Networks
    Ramteke, Ashwajit
    Talmale, Girish
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 578 - 582
  • [24] Multi-factor information matrix: A directed weighted method to identify influential nodes in social networks
    Wang, Yan
    Zhang, Ling
    Yang, Junwen
    Yan, Ming
    Li, Haozhan
    CHAOS SOLITONS & FRACTALS, 2024, 180
  • [25] Reliable Multi-Factor User Authentication With One Single Finger Swipe
    Liu, Jianwei
    Cui, Kaiyan
    Zou, Xiang
    Han, Jinsong
    Lin, Feng
    Ren, Kui
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2023, 31 (03) : 1117 - 1131
  • [26] User Modeling in Large Social Networks
    Dong, Yuxiao
    PROCEEDINGS OF THE NINTH ACM INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING (WSDM'16), 2016, : 713 - 713
  • [27] Point-of-interest recommendation integrating user perception and multi-factor
    Lu Q.-J.
    Wang N.
    Li J.-B.
    Li K.
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2023, 57 (02): : 310 - 319
  • [28] Research on Multi-factor Sofa Inclination Comfort Based on User Experience
    Hu, Huimin
    Luo, Ling
    Yao, Yanlong
    Zhao, Chaoyi
    Wu, Haimei
    Zhang, Xin
    Ran, Linghua
    Wang, Rui
    ADVANCES IN USABILITY AND USER EXPERIENCE, AHFE 2017, 2018, 607 : 698 - 708
  • [29] Multi-factor user authentication and key agreement scheme for wireless sensor networks using Chinese remainder theorem
    Tyagi, Gaurav
    Kumar, Rahul
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (01) : 260 - 276
  • [30] Multi-factor user authentication and key agreement scheme for wireless sensor networks using Chinese remainder theorem
    Gaurav Tyagi
    Rahul Kumar
    Peer-to-Peer Networking and Applications, 2023, 16 : 260 - 276