2016 IEEE 16th International Conference on Data Mining (ICDM) 2016
DOI: 10.1109/icdm.2016.0126
|View full text |Cite
|
Sign up to set email alerts
|

Time-Aware User Identification with Topic Models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…Temporal information is also an important factor for distinguishing individual users in a household (Campos et al, ; Iguchi et al, ; Lesaege et al, ). For example, day of the week and hour of the day were demonstrated to be effective time features for identifying active household members (Campos et al, ).…”
Section: Related Work and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Temporal information is also an important factor for distinguishing individual users in a household (Campos et al, ; Iguchi et al, ; Lesaege et al, ). For example, day of the week and hour of the day were demonstrated to be effective time features for identifying active household members (Campos et al, ).…”
Section: Related Work and Discussionmentioning
confidence: 99%
“…In this article, our primary goal is not to distinguish users in the same household through time. As known (Lesaege et al, ), different users in the same household are reluctant to login with different accounts when they want to watch TV. Thus, in real applications, we do not know how many users are living in a household, let alone who is responsible for each video viewing record.…”
Section: Related Work and Discussionmentioning
confidence: 99%
“…Many works [8], [29], [44] aimed at discovery theft's behavioral pattern. Bursztein et al [40] pointed out that identity thieves usually behave in two possible suspicious patterns, i.e., (1) behaving unlike the majority of users; (2) behaving only unlike the victim.…”
Section: Suspicious Behavior Simulationmentioning
confidence: 99%
“…Ruan et al [30] conducted a study on online user behavior by collecting and analyzing user clickstreams of a well known OSN. Lesaege et al [29] developed a topic model extending the Latent Dirichlet Allocation (LDA) to identify the active users. Viswanath et al [44] presented a technique based on Principal Component Analysis (PCA) that accurately modeled the "like" behavior of normal users in Facebook and identified significant deviations from it as anomalous behaviors.…”
Section: Literature Reviewmentioning
confidence: 99%