期刊文献+

移动社交网络异常签到在线检测算法 被引量:4

Online check-in outlier detection method in mobile social networks
下载PDF
导出
摘要 随着智能手机、Pad等智能移动设备的广泛普及,移动社交网络的应用得到了快速发展。本文针对移动社交网络中用户异常签到位置检测问题,提出了一类基于用户移动行为特征的异常签到在线检测方法。首先,在基于距离的异常模型基础上,提出了基于历史位置(H-Outlier)和基于好友圈(F-Outlier)两种异常签到模型;然后,针对HOutlier提出了一种优化的检测算法H-Opt,利用所提的签到状态模型与优化的邻居搜索机制降低检测时间;针对FOutlier提出了一种基于触发的优化检测算法F-Opt,将连续的在线异常检测转化成了基于触发的异常检测方式;最后,在真实的移动社交网络用户签到数据集上,验证了所提算法的有效性。实验结果显示,F-Opt显著降低了H-Opt的异常检测错误率;同时,相比于LUE算法,F-Opt和H-Opt的效率分别平均提升了2.34倍和2.45倍。 With the increasing popularization of smartphone,Pads and other smart mobile devices,the use of mobile social networks has also developed rapidly. In this paper,we propose an online method for detecting checkin outliers based on user mobility behavior in mobile social networks. First,based on a distance-based outlier model,we propose two check-in outlier models with respect to historical location( H-Outlier) and friend circle( FOutlier),respectively. Second,for the H-Outlier,we propose an optimized detection algorithm called H-Opt,which utilizes the proposed check-in status model and an optimized neighbor searching mechanism to reduce computation time. For the F-Outlier,we propose a trigger-based optimized detection algorithm called F-Opt,which transforms continuous online outlier detection into trigger-based outlier detection. Lastly, we present our experimental results,based on a real-world check-in dataset,which demonstrate the effectiveness of the proposed algorithm. Our experimental results show that F-Opt significantly reduces the error rate of H-Opt outlier detection.In addition,compared with the LUE algorithm,the F-Opt and H-Opt algorithms improved efficiency by 2.34 and2.45 times,respectively.
出处 《智能系统学报》 CSCD 北大核心 2017年第5期752-759,共8页 CAAI Transactions on Intelligent Systems
基金 国家自然科学基金项目(61403328 61572419) 山东省重点研发计划项目(2015GSF115009) 山东省自然科学基金项目(ZR2014FQ016) 烟台大学研究生科技创新基金项目(YDZD1712)
关键词 移动社交网络 异常检测 签到位置 基于距离的异常 好友圈 签到状态 邻居搜索 时间触发检测 location-based social networks outlier detection check-in location distance-based outlier friendcircle status of check-in neighbor searching time-triggered detection
  • 相关文献

参考文献1

二级参考文献92

  • 1Ellison N B. Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 2007, 13(1): 210-230.
  • 2Gao H, Hu J, Huang T, et al. Security issues in online social networks. IEEE Internet Computing, 2011, 15(4): 56-63.
  • 3Fire M, Goldschmidt R, Elovici Y. Online social networks: Threats and solutions survey. IEEE Communications Surveys and Tutorials, 2013, 16(4): 2019-2036.
  • 4Caviglione L, Coccoli M, Merlo A. A taxonomy-based model of security and privacy in online social networks. International Journal of Computational Science and Engineering, 20149 9(4): 325-338.
  • 5Thomas K, McCoy D, Grier C, et al. Trafficking fraudulent accounts: The role of the underground market in Twitter spam and abuse//Proceedings of the 22nd USENIX Security Symposium. Washington, USA, 2013:195-210.
  • 6Huang T K, Rahman M S, Madhyastha H V, et al. An analysis of socware cascades in online social, networks// Proceedings of the 22nd International Conference on World Wide Web. Rio de Janeiro, Brazil, 2013:619-630.
  • 7Chu Z, Gianvccchio S, Wang H, et al. Who is tweeting on Twitter: Human, bot, or cyborg?//Procccdings of thc 26th Annual Computer Security Applications Conference. Austin, USA, 2010:21-30.
  • 8Kanich C, Kreibich C, Levchenko K, et al. Spamalytics: An empirical analysis of spam marketing conversion//Proceedings of the 15th ACM Conference on Computer and Communications Security. Alexandria, USA, 2008:3-14.
  • 9Stringhini G, Wang G, Egele M, et al. Follow the green: Growth and dynamics in Twitter follower markets//Proceedings of the 2013 Conference on Interne, Measurement Conference. Barcelona, Spain, 2013:163-176.
  • 10Xue J, Yang Z, Yang X, et al. VoteTrust: Leveraging friend invitation graph to defend against social network sybils //Proceedings of the 32nd IEEE International Conference on Computer Communications. Turin, Italy, 2013:2400-2408.

共引文献25

同被引文献31

引证文献4

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部