A survey for user behavior analysis based on machine learning techniques: current models and applications
出版年份 2021 全文链接
标题
A survey for user behavior analysis based on machine learning techniques: current models and applications
作者
关键词
-
出版物
APPLIED INTELLIGENCE
Volume -, Issue -, Pages -
出版商
Springer Science and Business Media LLC
发表日期
2021-01-27
DOI
10.1007/s10489-020-02160-x
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- User profile as a bridge in cross-domain recommender systems for sparsity reduction
- (2019) Ashish Kumar Sahu et al. APPLIED INTELLIGENCE
- Personalized location recommendation using mobile phone usage information
- (2019) Hongyu Shi et al. APPLIED INTELLIGENCE
- Adaptive deep Q-learning model for detecting social bots and influential users in online social networks
- (2019) Greeshma Lingam et al. APPLIED INTELLIGENCE
- Discovery of user-item subgroups via genetic algorithm for effective prediction of ratings in collaborative filtering
- (2019) Ayangleima Laishram et al. APPLIED INTELLIGENCE
- Discovering varying patterns of Normal and interleaved ADLs in smart homes
- (2019) Mahsa Raeiszadeh et al. APPLIED INTELLIGENCE
- HOBA: A novel feature engineering methodology for credit card fraud detection with a deep learning architecture
- (2019) Xinwei Zhang et al. INFORMATION SCIENCES
- Charging demand of Plug-in Electric Vehicles: Forecasting travel behavior based on a novel Rough Artificial Neural Network approach
- (2019) Hamidreza Jahangir et al. JOURNAL OF CLEANER PRODUCTION
- Ensemble machine learning-based algorithm for electric vehicle user behavior prediction
- (2019) Yu-Wei Chung et al. APPLIED ENERGY
- User behavior prediction in social networks using weighted extreme learning machine with distribution optimization
- (2018) Xiong Luo et al. Future Generation Computer Systems-The International Journal of eScience
- Risk Assessment in Social Networks Based on User Anomalous Behaviors
- (2018) Naeimeh Laleh et al. IEEE Transactions on Dependable and Secure Computing
- MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention
- (2018) Andrea Saracino et al. IEEE Transactions on Dependable and Secure Computing
- Appliance Flexibility Analysis Considering User's Behavior in Home Energy Management System Using Smart Plugs
- (2018) Shaopeng Zhai et al. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS
- Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication
- (2018) Chao Shen et al. IEEE Transactions on Information Forensics and Security
- A Data-Driven Approach for Driving Safety Risk Prediction Using Driver Behavior and Roadway Information Data
- (2018) Nasim Arbabzadeh et al. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
- Characterizing and Predicting Early Reviewers for Effective Product Marketing on E-Commerce Websites
- (2018) Ting Bai et al. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
- User behavior analytics-based classification of application layer HTTP-GET flood attacks
- (2018) Karanpreet Singh et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Parallel and incremental credit card fraud detection model to handle concept drift and data imbalance
- (2018) Akila Somasundaram et al. NEURAL COMPUTING & APPLICATIONS
- The science of fake news
- (2018) David M. J. Lazer et al. SCIENCE
- Secure and Usable User-in-a-Context Continuous Authentication in Smartphones Leveraging Non-Assisted Sensors
- (2018) Jose de Fuentes et al. SENSORS
- Detecting Malicious Behaviors in JavaScript Applications
- (2018) Jian Mao et al. IEEE Access
- Data-Driven Cell Zooming for Large-Scale Mobile Networks
- (2018) Hao Jiang et al. IEEE Transactions on Network and Service Management
- Using Data Augmentation in Continuous Authentication on Smartphones
- (2018) Yantao Li et al. IEEE Internet of Things Journal
- Data-Driven Cell Zooming for Large-Scale Mobile Networks
- (2018) Hao Jiang et al. IEEE Transactions on Network and Service Management
- Advanced Driving Behavior Analytics for an Improved Safety Assessment and Driver Fingerprinting
- (2018) Afaf Bouhoute et al. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
- A unified knowledge compiler to provide support the scientific community
- (2018) Alberto Fernández-Isabel et al. KNOWLEDGE-BASED SYSTEMS
- Merging user social network into the random walk model for better group recommendation
- (2018) Shanshan Feng et al. APPLIED INTELLIGENCE
- Consumption Behavior Analytics-Aided Energy Forecasting and Dispatch
- (2017) Yingchen Zhang et al. IEEE INTELLIGENT SYSTEMS
- Visualization of Driving Behavior Based on Hidden Feature Extraction by Using Deep Learning
- (2017) HaiLong Liu et al. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
- Personality, User Preferences and Behavior in Recommender systems
- (2017) Raghav Pavan Karumur et al. INFORMATION SYSTEMS FRONTIERS
- Anomaly detection for smartphone data streams
- (2017) Yisroel Mirsky et al. Pervasive and Mobile Computing
- Anomaly behavior analysis for IoT sensors
- (2017) Jesus Pacheco et al. Transactions on Emerging Telecommunications Technologies
- Analysis of Users’ Behavior in Structured e-Commerce Websites
- (2017) Sergio Hernandez et al. IEEE Access
- Modeling Data Transport Capacity of Mobile Networks for Mobile Social Services
- (2017) Zhong Li et al. IEEE Access
- Mining Customer Preference in Physical Stores From Interaction Behavior
- (2017) Yuanyi Chen et al. IEEE Access
- The rise of social bots
- (2016) Emilio Ferrara et al. COMMUNICATIONS OF THE ACM
- Continuous User Authentication on Mobile Devices: Recent progress and remaining challenges
- (2016) Vishal M. Patel et al. IEEE SIGNAL PROCESSING MAGAZINE
- TargetVue: Visual Analysis of Anomalous User Behaviors in Online Communication Systems
- (2016) Nan Cao et al. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS
- Fraud detection system: A survey
- (2016) Aisha Abdallah et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Toward Health Exercise Behavior Change for Teams Using Lifelog Sharing Models
- (2016) Yuuki Nishiyama et al. IEEE Journal of Biomedical and Health Informatics
- Clustering of Electricity Consumption Behavior Dynamics Toward Big Data Applications
- (2016) Yi Wang et al. IEEE Transactions on Smart Grid
- Nonoccurring Behavior Analytics: A New Area
- (2015) Longbing Cao et al. IEEE INTELLIGENT SYSTEMS
- MUCM: Multilevel User Cluster Mining Based on Behavior Profiles for Network Monitoring
- (2015) Tao Qin et al. IEEE Systems Journal
- Modeling Traffic Control Agency Decision Behavior for Multimodal Manual Signal Control Under Event Occurrences
- (2015) Nan Ding et al. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
- Segmentation and Clustering of Car-Following Behavior: Recognition of Driving Patterns
- (2015) Bryan Higgs et al. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
- What is the animal doing? Tools for exploring behavioural structure in animal movements
- (2015) Eliezer Gurarie et al. JOURNAL OF ANIMAL ECOLOGY
- User Activity Recognition in Smart Homes Using Pattern Clustering Applied to Temporal ANN Algorithm
- (2015) Serge Bourobou et al. SENSORS
- Evaluating Driving Styles by Normalizing Driving Behavior Based on Personalized Driver Modeling
- (2015) Bin Shi et al. IEEE Transactions on Systems Man Cybernetics-Systems
- Learning Driver Behavior Models from Traffic Observations for Decision Making and Planning
- (2015) Tobias Gindele et al. IEEE Intelligent Transportation Systems Magazine
- Characterizing User Behavior in Mobile Internet
- (2015) Jie Yang et al. IEEE Transactions on Emerging Topics in Computing
- Analysis of user behaviors by mining large network data sets
- (2014) Zhenhua Wang et al. Future Generation Computer Systems-The International Journal of eScience
- Behavior Informatics: A New Perspective
- (2014) Longbing Cao et al. IEEE INTELLIGENT SYSTEMS
- Cloud-Based Mobile Multimedia Recommendation System With User Behavior Information
- (2014) Yijun Mo et al. IEEE Systems Journal
- Daily life behaviour monitoring for health assessment using machine learning: bridging the gap between domains
- (2014) Hande Alemdar et al. Personal and Ubiquitous Computing
- Clustering-Based Ensemble Learning for Activity Recognition in Smart Homes
- (2014) Anna Jurek et al. SENSORS
- Internet of Things (IoT): A vision, architectural elements, and future directions
- (2013) Jayavardhana Gubbi et al. Future Generation Computer Systems-The International Journal of eScience
- Detection of malicious and non-malicious website visitors using unsupervised neural network learning
- (2012) Dusan Stevanovic et al. APPLIED SOFT COMPUTING
- A literature review and classification of recommender systems research
- (2012) Deuk Hee Park et al. EXPERT SYSTEMS WITH APPLICATIONS
- Wireless Sensor Network Based Home Monitoring System for Wellness Determination of Elderly
- (2012) Nagender Kumar Suryadevara et al. IEEE SENSORS JOURNAL
- Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication
- (2012) Mario Frank et al. IEEE Transactions on Information Forensics and Security
- Anomaly detection in wireless sensor networks: A survey
- (2011) Miao Xie et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Smart homes for the elderly dementia sufferers: identification and prediction of abnormal behaviour
- (2011) Ahmad Lotfi et al. Journal of Ambient Intelligence and Humanized Computing
- Web user behavioral profiling for user identification
- (2010) Yinghui (Catherine) Yang DECISION SUPPORT SYSTEMS
- Detection of financial statement fraud and feature selection using data mining techniques
- (2010) P. Ravisankar et al. DECISION SUPPORT SYSTEMS
- Reinforcement learning-based multi-agent system for network traffic signal control
- (2010) I. Arel et al. IET Intelligent Transport Systems
- Anomaly detection
- (2009) Varun Chandola et al. ACM COMPUTING SURVEYS
- Biometrics in Identity Management Systems
- (2008) James L. Wayman IEEE SECURITY & PRIVACY
- An application of supervised and unsupervised learning approaches to telecommunications fraud detection
- (2008) Constantinos S. Hilas et al. KNOWLEDGE-BASED SYSTEMS
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started