Modeling Multi-factor Sequential User Behavior Data over Social Networks

被引:2
|
作者
Wang Peng [1 ,2 ,3 ]
Zhang Peng [2 ]
Zhou Chuang [2 ]
Guo Li [2 ]
Fang Binxing [2 ]
Yang Tao [4 ]
机构
[1] Chinese Acad Sci, Inst Comp Technol, Beijing 100190, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing 100089, Peoples R China
[3] Beijing Univ Posts & Telecommun, Beijing 100876, Peoples R China
[4] China Informat Technol Secur Evaluat Ctr, Beijing 100085, Peoples R China
关键词
Malicious user detection; User behavior; Social networks; Bayesian model; Social influence;
D O I
10.1049/cje.2016.03.025
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Modeling dynamic user behavior over online social networks not only helps us understand user behavior patterns on social networks, but also improves the performance of behavior analysis tasks. Time-varying user behavior is commonly influenced by multiple factors: user habit, social influence and external events. Existing works either consider only a part of these factors, or fail to model the dynamics behind user behavior. Thus, they cannot precisely model the user behavior. We present a generative Bayesian model HES to model dynamic user behavior data. We take the influential factors and user's selection process as separate latent variables, based on which we can recover the evolving patterns underneath user behavior data sequences. Empirical results on large-scale social networks show that the proposed approach outperforms existing user behavior prediction models by at least 8% w.r.t. prediction accuracy. Our work also unveils some interesting insights underneath social behavior data.
引用
收藏
页码:364 / 371
页数:8
相关论文
共 50 条
  • [41] User experience evaluation of intelligent sports bracelet based on multi-factor fusion
    Liu W.
    Liu Z.
    International Journal of Product Development, 2022, 26 (1-4) : 102 - 116
  • [42] A Study on User Access Control Method using Multi-Factor Authentication for EDMS
    Lee, Keunwang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (06): : 327 - 334
  • [43] Secure multi-factor remote user authentication scheme for Internet of Things environments
    Dhillon, Parwinder Kaur
    Kalra, Sheetal
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (16)
  • [44] Multi-factor user authentication scheme for IoT-based healthcare services
    Dhillon P.K.
    Kalra S.
    Dhillon, Parwinder Kaur (parwindhillon@gmail.com), 2018, Springer Science and Business Media Deutschland GmbH (04) : 141 - 160
  • [45] BioDraw: Reliable Multi-Factor User Authentication with One Single Finger Swipe
    Liu, Jianwei
    Zou, Xiang
    Han, Jinsong
    Lin, Feng
    Ren, Kui
    2020 IEEE/ACM 28TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2020,
  • [46] A Multi-factor Scheduling of Mixed Services for Integrated Data System
    Zhang, Yuan
    Peng, Huadong
    Bao, Minghui
    Chen, Chao
    An, Changping
    Cui, Ting
    Qin, Jian
    2015 IEEE ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2015, : 373 - 376
  • [47] A secure data backup scheme using multi-factor authentication
    Liu, Yining
    Zhong, Qi
    Chang, Liang
    Xia, Zhe
    He, Debiao
    Cheng, Chi
    IET INFORMATION SECURITY, 2017, 11 (05) : 250 - 255
  • [48] Distributed, multi-user, multi-application, and multi-sensor data fusion over named data networks
    Bandara, H. M. N. Dilum
    Jayasumana, Anura P.
    COMPUTER NETWORKS, 2013, 57 (16) : 3235 - 3248
  • [49] Modeling and Estimating User Influence in Social Networks
    Li, Pei
    Nie, Haichao
    Yin, Fengjing
    Liu, Jianxun
    Zhou, Dong
    IEEE ACCESS, 2020, 8 (08): : 21943 - 21952
  • [50] User Modeling on Social Networks-Using User Tags and Weibo Content for User Modeling
    Chi, Xuehua
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON COMPUTER MODELING, SIMULATION AND ALGORITHM (CMSA 2018), 2018, 151 : 1 - 3