期刊文献+
共找到9,034篇文章
< 1 2 250 >
每页显示 20 50 100
AMachine Learning Approach to User Profiling for Data Annotation of Online Behavior
1
作者 Moona Kanwal Najeed AKhan Aftab A.Khan 《Computers, Materials & Continua》 SCIE EI 2024年第2期2419-2440,共22页
The user’s intent to seek online information has been an active area of research in user profiling.User profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interest... The user’s intent to seek online information has been an active area of research in user profiling.User profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interests,and motivations.Determining user characteristics can help capture implicit and explicit preferences and intentions for effective user-centric and customized content presentation.The user’s complete online experience in seeking information is a blend of activities such as searching,verifying,and sharing it on social platforms.However,a combination of multiple behaviors in profiling users has yet to be considered.This research takes a novel approach and explores user intent types based on multidimensional online behavior in information acquisition.This research explores information search,verification,and dissemination behavior and identifies diverse types of users based on their online engagement using machine learning.The research proposes a generic user profile template that explains the user characteristics based on the internet experience and uses it as ground truth for data annotation.User feedback is based on online behavior and practices collected by using a survey method.The participants include both males and females from different occupation sectors and different ages.The data collected is subject to feature engineering,and the significant features are presented to unsupervised machine learning methods to identify user intent classes or profiles and their characteristics.Different techniques are evaluated,and the K-Mean clustering method successfully generates five user groups observing different user characteristics with an average silhouette of 0.36 and a distortion score of 1136.Feature average is computed to identify user intent type characteristics.The user intent classes are then further generalized to create a user intent template with an Inter-Rater Reliability of 75%.This research successfully extracts different user types based on their preferences in online content,platforms,criteria,and frequency.The study also validates the proposed template on user feedback data through Inter-Rater Agreement process using an external human rater. 展开更多
关键词 user intent CLUSTER user profile online search information sharing user behavior search reasons
下载PDF
Deep Learning Social Network Access Control Model Based on User Preferences
2
作者 Fangfang Shan Fuyang Li +3 位作者 Zhenyu Wang Peiyu Ji Mengyi Wang Huifang Sun 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期1029-1044,共16页
A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social netw... A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social networkandused to construct homogeneous and heterogeneous graphs.Secondly,a graph neural networkmodel is designed based on user daily social behavior and daily social data to simulate the dissemination and changes of user social preferences and user personal preferences in the social network.Then,high-order neighbor nodes,hidden neighbor nodes,displayed neighbor nodes,and social data nodes are used to update user nodes to expand the depth and breadth of user preferences.Finally,a multi-layer attention network is used to classify user nodes in the homogeneous graph into two classes:allow access and deny access.The fine-grained access control problem in social networks is transformed into a node classification problem in a graph neural network.The model is validated using a dataset and compared with other methods without losing generality.The model improved accuracy by 2.18%compared to the baseline method GraphSAGE,and improved F1 score by 1.45%compared to the baseline method,verifying the effectiveness of the model. 展开更多
关键词 Graph neural networks user preferences access control social network
下载PDF
A Fuzzy Trust Management Mechanism with Dynamic Behavior Monitoring for Wireless Sensor Networks
3
作者 Fu Shiming Zhang Ping Shi Xuehong 《China Communications》 SCIE CSCD 2024年第5期177-189,共13页
Traditional wireless sensor networks(WSNs)are typically deployed in remote and hostile environments for information collection.The wireless communication methods adopted by sensor nodes may make the network highly vul... Traditional wireless sensor networks(WSNs)are typically deployed in remote and hostile environments for information collection.The wireless communication methods adopted by sensor nodes may make the network highly vulnerable to various attacks.Traditional encryption and authentication mechanisms cannot prevent attacks launched by internal malicious nodes.The trust-based security mechanism is usually adopted to solve this problem in WSNs.However,the behavioral evidence used for trust estimation presents some uncertainties due to the open wireless medium and the inexpensive sensor nodes.Moreover,how to efficiently collect behavioral evidences are rarely discussed.To address these issues,in this paper,we present a trust management mechanism based on fuzzy logic and a cloud model.First,a type-II fuzzy logic system is used to preprocess the behavioral evidences and alleviate uncertainty.Then,the cloud model is introduced to estimate the trust values for sensor nodes.Finally,a dynamic behavior monitoring protocol is proposed to provide a balance between energy conservation and safety assurance.Simulation results demonstrate that our trust management mechanism can effectively protect the network from internal malicious attacks while enhancing the energy efficiency of behavior monitoring. 展开更多
关键词 behavior monitoring CLOUD FUZZY TRUST wireless sensor networks
下载PDF
Resource Allocation in Multi-User Cellular Networks:A Transformer-Based Deep Reinforcement Learning Approach
4
作者 Zhao Di Zheng Zhong +2 位作者 Qin Pengfei Qin Hao Song Bin 《China Communications》 SCIE CSCD 2024年第5期77-96,共20页
To meet the communication services with diverse requirements,dynamic resource allocation has shown increasing importance.In this paper,we consider the multi-slot and multi-user resource allocation(MSMU-RA)in a downlin... To meet the communication services with diverse requirements,dynamic resource allocation has shown increasing importance.In this paper,we consider the multi-slot and multi-user resource allocation(MSMU-RA)in a downlink cellular scenario with the aim of maximizing system spectral efficiency while guaranteeing user fairness.We first model the MSMURA problem as a dual-sequence decision-making process,and then solve it by a novel Transformerbased deep reinforcement learning(TDRL)approach.Specifically,the proposed TDRL approach can be achieved based on two aspects:1)To adapt to the dynamic wireless environment,the proximal policy optimization(PPO)algorithm is used to optimize the multi-slot RA strategy.2)To avoid co-channel interference,the Transformer-based PPO algorithm is presented to obtain the optimal multi-user RA scheme by exploring the mapping between user sequence and resource sequence.Experimental results show that:i)the proposed approach outperforms both the traditional and DRL methods in spectral efficiency and user fairness,ii)the proposed algorithm is superior to DRL approaches in terms of convergence speed and generalization performance. 展开更多
关键词 dynamic resource allocation multi-user cellular network spectrum efficiency user fairness
下载PDF
Cluster DetectionMethod of Endogenous Security Abnormal Attack Behavior in Air Traffic Control Network
5
作者 Ruchun Jia Jianwei Zhang +2 位作者 Yi Lin Yunxiang Han Feike Yang 《Computers, Materials & Continua》 SCIE EI 2024年第5期2523-2546,共24页
In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set f... In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set for ATC cybersecurity attacks is constructed by setting the feature states,adding recursive features,and determining the feature criticality.The expected information gain and entropy of the feature data are computed to determine the information gain of the feature data and reduce the interference of similar feature data.An autoencoder is introduced into the AI(artificial intelligence)algorithm to encode and decode the characteristics of ATC network security attack behavior to reduce the dimensionality of the ATC network security attack behavior data.Based on the above processing,an unsupervised learning algorithm for clustering detection of ATC network security attacks is designed.First,determine the distance between the clustering clusters of ATC network security attack behavior characteristics,calculate the clustering threshold,and construct the initial clustering center.Then,the new average value of all feature objects in each cluster is recalculated as the new cluster center.Second,it traverses all objects in a cluster of ATC network security attack behavior feature data.Finally,the cluster detection of ATC network security attack behavior is completed by the computation of objective functions.The experiment took three groups of experimental attack behavior data sets as the test object,and took the detection rate,false detection rate and recall rate as the test indicators,and selected three similar methods for comparative test.The experimental results show that the detection rate of this method is about 98%,the false positive rate is below 1%,and the recall rate is above 97%.Research shows that this method can improve the detection performance of security attacks in air traffic control network. 展开更多
关键词 Air traffic control network security attack behavior cluster detection behavioral characteristics information gain cluster threshold automatic encoder
下载PDF
Resource Allocation for IRS Assistedmm Wave Wireless Powered Sensor Networks with User Cooperation
6
作者 Yonghui Lin Zhengyu Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期663-677,共15页
In this paper,we investigate IRS-aided user cooperation(UC)scheme in millimeter wave(mmWave)wirelesspowered sensor networks(WPSN),where two single-antenna users are wireless powered in the wireless energy transfer(WET... In this paper,we investigate IRS-aided user cooperation(UC)scheme in millimeter wave(mmWave)wirelesspowered sensor networks(WPSN),where two single-antenna users are wireless powered in the wireless energy transfer(WET)phase first and then cooperatively transmit information to a hybrid access point(AP)in the wireless information transmission(WIT)phase,following which the IRS is deployed to enhance the system performance of theWET andWIT.We maximized the weighted sum-rate problem by jointly optimizing the transmit time slots,power allocations,and the phase shifts of the IRS.Due to the non-convexity of the original problem,a semidefinite programming relaxation-based approach is proposed to convert the formulated problem to a convex optimization framework,which can obtain the optimal global solution.Simulation results demonstrate that the weighted sum throughput of the proposed UC scheme outperforms the non-UC scheme whether equipped with IRS or not. 展开更多
关键词 Intelligent reflecting surface millimeter wave wireless powered sensor networks user cooperation resource allocation
下载PDF
Studying the co-evolution of information diffusion,vaccination behavior and disease transmission in multilayer networks with local and global effects
7
作者 霍良安 武兵杰 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期677-689,共13页
Today,with the rapid development of the internet,a large amount of information often accompanies the rapid transmission of disease outbreaks,and increasing numbers of scholars are studying the relationship between inf... Today,with the rapid development of the internet,a large amount of information often accompanies the rapid transmission of disease outbreaks,and increasing numbers of scholars are studying the relationship between information and the disease transmission process using complex networks.In fact,the disease transmission process is very complex.Besides this information,there will often be individual behavioral measures and other factors to consider.Most of the previous research has aimed to establish a two-layer network model to consider the impact of information on the transmission process of disease,rarely divided into information and behavior,respectively.To carry out a more in-depth analysis of the disease transmission process and the intrinsic influencing mechanism,this paper divides information and behavior into two layers and proposes the establishment of a complex network to study the dynamic co-evolution of information diffusion,vaccination behavior,and disease transmission.This is achieved by considering four influential relationships between adjacent layers in multilayer networks.In the information layer,the diffusion process of negative information is described,and the feedback effects of local and global vaccination are considered.In the behavioral layer,an individual's vaccination behavior is described,and the probability of an individual receiving a vaccination is influenced by two factors:the influence of negative information,and the influence of local and global disease severity.In the disease layer,individual susceptibility is considered to be influenced by vaccination behavior.The state transition equations are derived using the micro Markov chain approach(MMCA),and disease prevalence thresholds are obtained.It is demonstrated through simulation experiments that the negative information diffusion is less influenced by local vaccination behavior,and is mainly influenced by global vaccination behavior;vaccination behavior is mainly influenced by local disease conditions,and is less influenced by global disease conditions;the disease transmission threshold increases with the increasing vaccination rate;and the scale of disease transmission increases with the increasing negative information diffusion rate and decreases with the increasing vaccination rate.Finally,it is found that when individual vaccination behavior considers both the influence of negative information and disease,it can increase the disease transmission threshold and reduce the scale of disease transmission.Therefore,we should resist the diffusion of negative information,increase vaccination proportions,and take appropriate protective measures in time. 展开更多
关键词 information diffusion vaccination behavior disease transmission multilayer networks local and global effect
下载PDF
Database Search Behaviors: Insight from a Survey of Information Retrieval Practices
8
作者 Babita Trivedi Brijender Dahiya +2 位作者 Anjali Maan Rajesh Giri Vinod Prasad 《Intelligent Information Management》 2024年第5期195-218,共24页
This study examines the database search behaviors of individuals, focusing on gender differences and the impact of planning habits on information retrieval. Data were collected from a survey of 198 respondents, catego... This study examines the database search behaviors of individuals, focusing on gender differences and the impact of planning habits on information retrieval. Data were collected from a survey of 198 respondents, categorized by their discipline, schooling background, internet usage, and information retrieval preferences. Key findings indicate that females are more likely to plan their searches in advance and prefer structured methods of information retrieval, such as using library portals and leading university websites. Males, however, tend to use web search engines and self-archiving methods more frequently. This analysis provides valuable insights for educational institutions and libraries to optimize their resources and services based on user behavior patterns. 展开更多
关键词 Information Retrieval Database Search user behavior Patterns
下载PDF
Identification of Influential Users in Online Social Network: A Brief Overview
9
作者 Mahmuda Ferdous Md. Musfique Anwar 《Journal of Computer and Communications》 2023年第7期58-73,共16页
Information networks where users join a network, publish their own content, and create links to other users are called Online Social Networks (OSNs). Nowadays, OSNs have become one of the major platforms to promote bo... Information networks where users join a network, publish their own content, and create links to other users are called Online Social Networks (OSNs). Nowadays, OSNs have become one of the major platforms to promote both new and viral applications as well as disseminate information. Social network analysis is the study of these information networks that leads to uncovering patterns of interaction among the entities. In this regard, finding influential users in OSNs is very important as they play a key role in the success above phenomena. Various approaches exist to detect influential users in OSNs, starting from simply counting the immediate neighbors to more complex machine-learning and message-passing techniques. In this paper, we review the recent existing research works that focused on identifying influential users in OSNs. 展开更多
关键词 Online Social network Trending Topics Social Influence Influential user
下载PDF
The Research on E-mail Users' Behavior of Participating in Subjects Based on Social Network Analysis 被引量:3
10
作者 ZHANG Lejun ZHOU Tongxin +2 位作者 Qi Zhixin GUO Lin XU Li 《China Communications》 SCIE CSCD 2016年第4期70-80,共11页
The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related in... The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related information of an employee are introduced, and methods for deletion of false data are presented. Next, the three-layer model(User, Subject, Keyword) is proposed for analysis of user behavior. Then, the proposed keyword selection algorithm based on a greedy approach, and the influence and propagation of an e-mail subject are defined. Finally, the e-mail user behavior is analyzed for the Enron organization. This study has considerable significance in subject recommendation and character recognition. 展开更多
关键词 E-MAIL network social network ANALYSIS user behavior ANALYSIS KEYWORD selection
下载PDF
Web users' language utilization behaviors in China
11
作者 LAI Maosheng QU Peng ZHAO Kang 《Chinese Journal of Library and Information Science》 2009年第1期1-18,共18页
The paper focuses on the habits of China Web users' language utilization behaviors in accessing the Web. It also seeks to make a general study on the basic nature of language phenomenon with regard to digital acce... The paper focuses on the habits of China Web users' language utilization behaviors in accessing the Web. It also seeks to make a general study on the basic nature of language phenomenon with regard to digital accessing. A questionnaire survey was formulated and distributed online for these research purposes. There were 1,267 responses collected. The data were analyzed with descriptive statistics, Chi-square testing and contingency table analyses. Results revealed the following findings. Tagging has already played an important role in Web2.0 communication for China's Web users. China users rely greatly on all kinds of taxonomies in browsing and have also an awareness of them in effective searching. These imply that the classified languages in digital environment may aid Chinese Web users in a more satisfying manner. Highly subject-specific words, especially those from authorized tools, yielded better results in searching. Chinese users have high recognition for related terms. As to the demographic aspect, there is little difference between different genders in the utilization of information retrieval languages. Age may constitute a variable element to a certain degree. Educational background has a complex effect on language utilizations in searching. These research findings characterize China Web users' behaviors in digital information accessing. They also can be potentially valuable for the modeling and further refinement of digital accessing services. 展开更多
关键词 Digital accessing Language utilization behaviors China's Web users
下载PDF
Attack Behavior Extraction Based on Heterogeneous Cyberthreat Intelligence and Graph Convolutional Networks 被引量:1
12
作者 Binhui Tang Junfeng Wang +3 位作者 Huanran Qiu Jian Yu Zhongkun Yu Shijia Liu 《Computers, Materials & Continua》 SCIE EI 2023年第1期235-252,共18页
The continuous improvement of the cyber threat intelligence sharing mechanism provides new ideas to deal with Advanced Persistent Threats(APT).Extracting attack behaviors,i.e.,Tactics,Techniques,Procedures(TTP)from Cy... The continuous improvement of the cyber threat intelligence sharing mechanism provides new ideas to deal with Advanced Persistent Threats(APT).Extracting attack behaviors,i.e.,Tactics,Techniques,Procedures(TTP)from Cyber Threat Intelligence(CTI)can facilitate APT actors’profiling for an immediate response.However,it is difficult for traditional manual methods to analyze attack behaviors from cyber threat intelligence due to its heterogeneous nature.Based on the Adversarial Tactics,Techniques and Common Knowledge(ATT&CK)of threat behavior description,this paper proposes a threat behavioral knowledge extraction framework that integrates Heterogeneous Text Network(HTN)and Graph Convolutional Network(GCN)to solve this issue.It leverages the hierarchical correlation relationships of attack techniques and tactics in the ATT&CK to construct a text network of heterogeneous cyber threat intelligence.With the help of the Bidirectional EncoderRepresentation fromTransformers(BERT)pretraining model to analyze the contextual semantics of cyber threat intelligence,the task of threat behavior identification is transformed into a text classification task,which automatically extracts attack behavior in CTI,then identifies the malware and advanced threat actors.The experimental results show that F1 achieve 94.86%and 92.15%for the multi-label classification tasks of tactics and techniques.Extend the experiment to verify the method’s effectiveness in identifying the malware and threat actors in APT attacks.The F1 for malware and advanced threat actors identification task reached 98.45%and 99.48%,which are better than the benchmark model in the experiment and achieve state of the art.The model can effectivelymodel threat intelligence text data and acquire knowledge and experience migration by correlating implied features with a priori knowledge to compensate for insufficient sample data and improve the classification performance and recognition ability of threat behavior in text. 展开更多
关键词 Attack behavior extraction cyber threat intelligence(CTI) graph convolutional network(GCN) heterogeneous textual network(HTN)
下载PDF
Analysis of cumulative handoff delay for graded secondary users in cognitive radio networks
13
作者 Zhang Lei 张雷 +2 位作者 宋铁成 吴名 胡静 《Journal of Southeast University(English Edition)》 EI CAS 2013年第2期111-117,共7页
According to the fact that the secondary users' delay requirements for data transmission are not unitary in cognitive radio networks, the secondary users are divided into two classes, denoted by SU1 and SU2, respecti... According to the fact that the secondary users' delay requirements for data transmission are not unitary in cognitive radio networks, the secondary users are divided into two classes, denoted by SU1 and SU2, respectively. It is assumed that SU1 has a higher priority to occupy the primary users' unutilized channels than SU2. A preemptive resume priority M/G/1 queuing network is used to model the multiple spectrum handoffs processing. By using a state transition probability matrix and a cost matrix, the average cumulative delays of SU1 and SU2 are calculated, respectively. Numerical results show that the more the primary user's traffic load, the more rapidly the SU2's cumulative handoff delay grows. Compared with the networks where secondary users are unitary, the lower the SUI's arrival rate, the more obviously both SUI's and SU2's handoff delays decrease. The admission access regions limited by the maximum tolerable delay can also facilitate the design of admission control rules for graded secondary users. 展开更多
关键词 cognitive radio network graded secondary users multiple spectrum handoffs cumulative handoff delay admission access region
下载PDF
Evaluation of Microblog Users’ Influence Based on PageRank and Users Behavior Analysis 被引量:6
14
作者 Lijuan Huang Yeming Xiong 《Advances in Internet of Things》 2013年第2期34-40,共7页
This paper explores the uses’ influences on microblog. At first, according to the social network theory, we present an analysis of information transmitting network structure based on the relationship of following and... This paper explores the uses’ influences on microblog. At first, according to the social network theory, we present an analysis of information transmitting network structure based on the relationship of following and followed phenomenon of microblog users. Informed by the microblog user behavior analysis, the paper also addresses a model for calculating weights of users’ influence. It proposes a U-R model, using which we can evaluate users’ influence based on PageRank algorithms and analyzes user behaviors. In the U-R model, the effect of user behaviors is explored and PageRank is applied to evaluate the importance and the influence of every user in a microblog network by repeatedly iterating their own U-R value. The users’ influences in a microblog network can be ranked by the U-R value. Finally, the validity of U-R model is proved with a real-life numerical example. 展开更多
关键词 SOCIAL network Microblog users behavior PAGERANK ALGORITHMS U-R Model INFLUENCE
下载PDF
BARN:Behavior-Aware Relation Network for multi-label behavior detection in socially housed macaques
15
作者 Sen Yang Zhi-Yuan Chen +5 位作者 Ke-Wei Liang Cai-Jie Qin Yang Yang Wen-Xuan Fan Chen-Lu Jie Xi-Bo Ma 《Zoological Research》 SCIE CSCD 2023年第6期1026-1038,共13页
Quantification of behaviors in macaques provides crucial support for various scientific disciplines,including pharmacology,neuroscience,and ethology.Despite recent advancements in the analysis of macaque behavior,rese... Quantification of behaviors in macaques provides crucial support for various scientific disciplines,including pharmacology,neuroscience,and ethology.Despite recent advancements in the analysis of macaque behavior,research on multi-label behavior detection in socially housed macaques,including consideration of interactions among them,remains scarce.Given the lack of relevant approaches and datasets,we developed the Behavior-Aware Relation Network(BARN)for multi-label behavior detection of socially housed macaques.Our approach models the relationship of behavioral similarity between macaques,guided by a behavior-aware module and novel behavior classifier,which is suitable for multi-label classification.We also constructed a behavior dataset of rhesus macaques using ordinary RGB cameras mounted outside their cages.The dataset included 65?913 labels for19 behaviors and 60?367 proposals,including identities and locations of the macaques.Experimental results showed that BARN significantly improved the baseline SlowFast network and outperformed existing relation networks.In conclusion,we successfully achieved multilabel behavior detection of socially housed macaques with both economic efficiency and high accuracy. 展开更多
关键词 Macaque behavior Drug safety assessment Multi-label behavior detection behavioral similarity Relation network
下载PDF
Spectrum-Efficient User Association in Caching Enabled Dense Small Cell Network
16
作者 Junyu Liu Min Sheng +2 位作者 Xiaona Zhao Shuang Ni Jiandong Li 《China Communications》 SCIE CSCD 2023年第3期86-104,共19页
In this paper,we reveal the fundamental limitation of network densification on the performance of caching enabled small cell network(CSCN)under two typical user association rules,namely,contentand distance-based rules... In this paper,we reveal the fundamental limitation of network densification on the performance of caching enabled small cell network(CSCN)under two typical user association rules,namely,contentand distance-based rules.It indicates that immoderately caching content would significantly change the interference distribution in CSCN,which may degrade the network area spectral efficiency(ASE).Meanwhile,it is shown that content-based rule outperforms the distance-based rule in terms of network ASE only when small cell base stations(BSs)are sparsely deployed with low decoding thresholds.Moreover,it is proved that network ASE under distance-based user association serves as the upper bound of that under content-based rule in dense BS regime.To enable more spectrum-efficient user association in dense CSCN,we further optimize network ASE by designing a probabilistic content retrieving strategy based on distance-based rule.With the optimized retrieving probability,network ASE could be substantially enhanced and even increase with the growing BS density in dense BS regime. 展开更多
关键词 CACHING dense network user association
下载PDF
Impact of individual behavior adoption heterogeneity on epidemic transmission in multiplex networks
17
作者 霍良安 于跃 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第10期756-767,共12页
In recent years, the impact of information diffusion and individual behavior adoption patterns on epidemic transmission in complex networks has received significant attention. In the immunization behavior adoption pro... In recent years, the impact of information diffusion and individual behavior adoption patterns on epidemic transmission in complex networks has received significant attention. In the immunization behavior adoption process, different individuals often make behavioral decisions in different ways, and it is of good practical importance to study the influence of individual heterogeneity on the behavior adoption process. In this paper, we propose a three-layer coupled model to analyze the process of co-evolution of official information diffusion, immunization behavior adoption and epidemic transmission in multiplex networks, focusing on individual heterogeneity in behavior adoption patterns. Specifically, we investigate the impact of the credibility of social media and the risk sensitivity of the population on behavior adoption in further study of the effect of heterogeneity of behavior adoption on epidemic transmission. Then we use the microscopic Markov chain approach to describe the dynamic process and capture the evolution of the epidemic threshold. Finally, we conduct extensive simulations to prove our findings. Our results suggest that enhancing the credibility of social media can raise the epidemic transmission threshold, making it effective at controlling epidemic transmission during the dynamic process. In addition, improving an individuals' risk sensitivity, and thus their taking effective protective measures, can also reduce the number of infected individuals and delay the epidemic outbreak. Our study explores the role of individual heterogeneity in behavior adoption in real networks, more clearly models the effect of the credibility of social media and risk sensitivity of the population on the epidemic transmission dynamic, and provides a useful reference for managers to formulate epidemic control and prevention policies. 展开更多
关键词 multiplex network epidemic transmission behavior
下载PDF
Development of a convolutional neural network based geomechanical upscaling technique for heterogeneous geological reservoir 被引量:1
18
作者 Zhiwei Ma Xiaoyan Ou Bo Zhang 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2024年第6期2111-2125,共15页
Geomechanical assessment using coupled reservoir-geomechanical simulation is becoming increasingly important for analyzing the potential geomechanical risks in subsurface geological developments.However,a robust and e... Geomechanical assessment using coupled reservoir-geomechanical simulation is becoming increasingly important for analyzing the potential geomechanical risks in subsurface geological developments.However,a robust and efficient geomechanical upscaling technique for heterogeneous geological reservoirs is lacking to advance the applications of three-dimensional(3D)reservoir-scale geomechanical simulation considering detailed geological heterogeneities.Here,we develop convolutional neural network(CNN)proxies that reproduce the anisotropic nonlinear geomechanical response caused by lithological heterogeneity,and compute upscaled geomechanical properties from CNN proxies.The CNN proxies are trained using a large dataset of randomly generated spatially correlated sand-shale realizations as inputs and simulation results of their macroscopic geomechanical response as outputs.The trained CNN models can provide the upscaled shear strength(R^(2)>0.949),stress-strain behavior(R^(2)>0.925),and volumetric strain changes(R^(2)>0.958)that highly agree with the numerical simulation results while saving over two orders of magnitude of computational time.This is a major advantage in computing the upscaled geomechanical properties directly from geological realizations without the need to perform local numerical simulations to obtain the geomechanical response.The proposed CNN proxybased upscaling technique has the ability to(1)bridge the gap between the fine-scale geocellular models considering geological uncertainties and computationally efficient geomechanical models used to assess the geomechanical risks of large-scale subsurface development,and(2)improve the efficiency of numerical upscaling techniques that rely on local numerical simulations,leading to significantly increased computational time for uncertainty quantification using numerous geological realizations. 展开更多
关键词 Upscaling Lithological heterogeneity Convolutional neural network(CNN) Anisotropic shear strength Nonlinear stressestrain behavior
下载PDF
Cyberattack Detection Framework Using Machine Learning and User Behavior Analytics
19
作者 Abdullah Alshehri Nayeem Khan +1 位作者 Ali Alowayr Mohammed Yahya Alghamdi 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1679-1689,共11页
This paper proposes a novel framework to detect cyber-attacks using Machine Learning coupled with User Behavior Analytics.The framework models the user behavior as sequences of events representing the user activities ... This paper proposes a novel framework to detect cyber-attacks using Machine Learning coupled with User Behavior Analytics.The framework models the user behavior as sequences of events representing the user activities at such a network.The represented sequences are thenfitted into a recurrent neural network model to extract features that draw distinctive behavior for individual users.Thus,the model can recognize frequencies of regular behavior to profile the user manner in the network.The subsequent procedure is that the recurrent neural network would detect abnormal behavior by classifying unknown behavior to either regu-lar or irregular behavior.The importance of the proposed framework is due to the increase of cyber-attacks especially when the attack is triggered from such sources inside the network.Typically detecting inside attacks are much more challenging in that the security protocols can barely recognize attacks from trustful resources at the network,including users.Therefore,the user behavior can be extracted and ultimately learned to recognize insightful patterns in which the regular patterns reflect a normal network workflow.In contrast,the irregular patterns can trigger an alert for a potential cyber-attack.The framework has been fully described where the evaluation metrics have also been introduced.The experimental results show that the approach performed better compared to other approaches and AUC 0.97 was achieved using RNN-LSTM 1.The paper has been concluded with pro-viding the potential directions for future improvements. 展开更多
关键词 CYBERSECURITY deep learning machine learning user behavior analytics
下载PDF
Container Networking Performance Analysis for Large-Scale User Behavior Simulation 被引量:1
20
作者 Yifang Ji Guomin Zhang +1 位作者 Shengxu Xie Xiulei Wang 《Journal of Computer and Communications》 2019年第10期136-146,共11页
Accurately simulating large-scale user behavior is important to improve the similarity between the cyber range and the real network environment. The Linux Container provides a method to simulate the behavior of large-... Accurately simulating large-scale user behavior is important to improve the similarity between the cyber range and the real network environment. The Linux Container provides a method to simulate the behavior of large-scale users under the constraints of limited physical resources. In a container-based virtualization environment, container networking is an important component. To evaluate the impact of different networking methods between the containers on the simulation performance, the typical container networking methods such as none, bridge, macvlan were analyzed, and the performance of different networking methods was evaluated according to the throughput and latency metrics. The experiments show that under the same physical resource constraints, the macvlan networking method has the best network performance, while the bridge method has the worst performance. This result provides a reference for selecting the appropriate networking method in the user behavior simulation process. 展开更多
关键词 Linux CONTAINER networkING Mode network Performance user behavior SIMULATION
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部