期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Abnormal user identification based on XGBoost algorithm 被引量:6
1
作者 SONG Xiao-yu SUN Xiang-yang ZHAO Yang 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2018年第4期339-346,共8页
The eXtreme gradient boosting(XGBoost)algorithm is used to identify abnormal users.Firstly,the raw data were cleaned.Then user power characteristics were extracted from different aspects.Finally,the XGBoost classifier... The eXtreme gradient boosting(XGBoost)algorithm is used to identify abnormal users.Firstly,the raw data were cleaned.Then user power characteristics were extracted from different aspects.Finally,the XGBoost classifier was used to identify the abnormal users respectively in the balanced sample set and the unbalanced sample set.In contrast,under the same characteristics,the k-nearest neighbor(KNN)classifier,back-propagation(BP)neural network classifier and random forest classifier were used to identify the abnormal users in the two samples.The experimental results show that the XGBoost classifier has higher recognition rate and faster running speed.Especially in the imbalanced data sets,the performance improvement is obvious. 展开更多
关键词 user identification electricity characteristics eXtreme gradient boosting (XGBoost) random forest
下载PDF
Multi Sensor-Based Implicit User Identification
2
作者 Muhammad Ahmad Rana Aamir Raza +5 位作者 Manuel Mazzara Salvatore Distefano Ali Kashif Bashir Adil Khan Muhammad Shahzad Sarfraz Muhammad Umar Aftab 《Computers, Materials & Continua》 SCIE EI 2021年第8期1673-1692,共20页
Smartphones have ubiquitously integrated into our home and work environments,however,users normally rely on explicit but inefficient identification processes in a controlled environment.Therefore,when a device is stol... Smartphones have ubiquitously integrated into our home and work environments,however,users normally rely on explicit but inefficient identification processes in a controlled environment.Therefore,when a device is stolen,a thief can have access to the owner’s personal information and services against the stored passwords.As a result of this potential scenario,this work proposes an automatic legitimate user identification system based on gait biometrics extracted from user walking patterns captured by smartphone sensors.A set of preprocessing schemes are applied to calibrate noisy and invalid samples and augment the gait-induced time and frequency domain features,then further optimized using a non-linear unsupervised feature selection method.The selected features create an underlying gait biometric representation able to discriminate among individuals and identify them uniquely.Different classifiers are adopted to achieve accurate legitimate user identification.Extensive experiments on a group of 16 individuals in an indoor environment show the effectiveness of the proposed solution:with 5 to 70 samples per window,KNN and bagging classifiers achieve 87–99%accuracy,82–98%for ELM,and 81–94%for SVM.The proposed pipeline achieves a 100%true positive and 0%false-negative rate for almost all classifiers. 展开更多
关键词 SENSORS SMARTPHONE legitimate user identification
下载PDF
Predicting and Classifying User Identification Code System Based on Support Vector Machines
3
作者 陈民枝 陈荣昌 +1 位作者 梁倩华 陈同孝 《Journal of Donghua University(English Edition)》 EI CAS 2007年第2期280-283,共4页
In digital fingerprinting, preventing piracy of images by colluders is an important and tedious issue. Each image will be embedded with a unique User IDentification (UID) code that is the fingerprint for tracking th... In digital fingerprinting, preventing piracy of images by colluders is an important and tedious issue. Each image will be embedded with a unique User IDentification (UID) code that is the fingerprint for tracking the authorized user. The proposed hiding scheme makes use of a random number generator to scramble two copies of a UID, which will then be hidden in the randomly selected medium frequency coefficients of the host image. The linear support vector machine (SVM) will be used to train classifications by calculating the normalized correlation (NC) for the 2class UID codes. The trained classifications will be the models used for identifying unreadable UID codes. Experimental results showed that the success of predicting the unreadable UID codes can be increased by applying SVM. The proposed scheme can be used to provide protections to intellectual property rights of digital images aad to keep track of users to prevent collaborative piracies. 展开更多
关键词 WATERMARK Support Vector Machines SVMs user identification (UID) code COLLUSION
下载PDF
Incremental User Identification Across Social Networks Based on User-Guider Similarity Index
4
作者 Yue Kou Dong Li +2 位作者 De-Rong Shen Tie-Zheng Nie Ge Yu 《Journal of Computer Science & Technology》 SCIE EI CSCD 2022年第5期1086-1104,共19页
Identifying accounts across different online social networks that belong to the same user has attracted extensive attentions.However,existing techniques rely on given user seeds and ignore the dynamic changes of onlin... Identifying accounts across different online social networks that belong to the same user has attracted extensive attentions.However,existing techniques rely on given user seeds and ignore the dynamic changes of online social networks,which fails to generate high quality identification results.In order to solve this problem,we propose an incremental user identification method based on user-guider similarity index(called CURIOUS),which efficiently identifies users and well captures the changes of user features over time.Specifically,we first construct a novel user-guider similarity index(called USI)to speed up the matching between users.Second we propose a two-phase user identification strategy consisting of USI-based bidirectional user matching and seed-based user matching,which is effective even for incomplete networks.Finally,we propose incremental maintenance for both USI and the identification results,which dynamically captures the instant states of social networks.We conduct experimental studies based on three real-world social networks.The experiments demonstrate the effectiveness and the efficiency of our proposed method in comparison with traditional methods.Compared with the traditional methods,our method improves precision,recall and rank score by an average of 0.19,0.16 and 0.09 respectively,and reduces the time cost by an average of 81%. 展开更多
关键词 user identification social network user-guider similarity index incremental maintenance
原文传递
Location Privacy in Mobile Big Data:User Identifiability via Habitat Region Representation
5
作者 Luoyang Fang Xiang Cheng +1 位作者 Liuqing Yang Haonan Wang 《Journal of Communications and Information Networks》 2018年第3期31-38,共8页
Mobile big data collected by mobile network operators is of interest to many research communities and industries for its remarkable values.However,such spatiotemporal information may lead to a harsh threat to subscrib... Mobile big data collected by mobile network operators is of interest to many research communities and industries for its remarkable values.However,such spatiotemporal information may lead to a harsh threat to subscribers’privacy.This work focuses on subscriber privacy vulnerability assessment in terms of user identifiability across two datasets with significant detail reduced mobility representation.In this paper,we propose an innovative semantic spatiotemporal representation for each subscriber based on the geographic information,termed as daily habitat region,to approximate the subscriber’s daily mobility coverage with far lesser information compared with original mobility traces.The daily habitat region is realized via convex hull extraction on the user’s daily spatiotemporal traces.As a result,user identification can be formulated to match two records with the maximum similarity score between two convex hull sets,obtained by our proposed similarity measures based on cosine distance and permutation hypothesis test.Experiments are conducted to evaluate our proposed innovative mobility representation and user identification algorithms,which also demonstrate that the subscriber’s mobile privacy is under a severe threat even with significantly reduced spatiotemporal information. 展开更多
关键词 mobile big data privacy attack user identification SPATIOTEMPORAL location privacy
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部