28 research outputs found

    Leveraging Multi-level Dependency of Relational Sequences for Social Spammer Detection

    Full text link
    Much recent research has shed light on the development of the relation-dependent but content-independent framework for social spammer detection. This is largely because the relation among users is difficult to be altered when spammers attempt to conceal their malicious intents. Our study investigates the spammer detection problem in the context of multi-relation social networks, and makes an attempt to fully exploit the sequences of heterogeneous relations for enhancing the detection accuracy. Specifically, we present the Multi-level Dependency Model (MDM). The MDM is able to exploit user's long-term dependency hidden in their relational sequences along with short-term dependency. Moreover, MDM fully considers short-term relational sequences from the perspectives of individual-level and union-level, due to the fact that the type of short-term sequences is multi-folds. Experimental results on a real-world multi-relational social network demonstrate the effectiveness of our proposed MDM on multi-relational social spammer detection

    Dynamic Advance Reservation for Grid System Using Resource Pools

    No full text
    Part 3: Session 3: Cluster and GridInternational audienceDynamic behavior of resources is a non-negligible feature in grid system, and most research efforts on advance reservation cannot effectively deal with the negative effect resulted from the dynamic feature. In this paper, a new grid system architecture using resource pool is proposed firstly. Theoretical analysis demonstrates that resource pool can well adapt to dynamic behavior of resources. Secondly, Quality of Service (QoS) distance computation method for hybrid variable types is presented. Then, k-set Availability Prediction Admission Control (kAPAC) algorithm is described in detail. Experimental results show that kAPAC can significantly increase success ratio of reservation, resource utilization and stability of grid system

    Estimating Space-Cooling Energy Consumption and Indoor PM2.5 Exposure across Hong Kong Using a City-Representative Housing Stock Model

    No full text
    High-quality data on building energy use and indoor pollution are critical to supporting government efforts to reduce carbon emissions and improve the population’s health. This study describes the development of a city-representative housing stock model used for estimating space-cooling energy use and indoor PM2.5 exposure across the Hong Kong housing stock. Archetypes representative of Hong Kong dwellings were developed based on geographically-referenced housing databases. Simulations of unique combinations of archetype, occupation, and environment were run using EnergyPlus, estimating the annual space-cooling energy consumption and annual average PM2.5 exposure concentrations under both non-retrofit and retrofit scenarios. Results show that modern village houses and top-floor flats in high-rise residential buildings, on average, used 19% more space-cooling energy than other archetypes. Dwellings in urban areas had lower exposure to outdoor-sourced PM2.5 and higher exposure to indoor-sourced PM2.5 compared to those in rural areas. The percentage decrease in space-cooling energy consumption caused by energy efficiency retrofits, including external wall insulation, low-e windows, and airtightening, varied significantly based on archetype. The implementation of external wall insulation in the housing stock led to an average decrease of 3.5% in indoor PM2.5 exposure, whilst airtightening and low-e windows resulted in 7.9% and 0.2% average increases in exposure, respectively

    Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system

    No full text
    Collaborative filtering (CF) technique is capable of generating personalized recommendations. However, the recommender systems utilizing CF as their key algorithms are vulnerable to shilling attacks which insert malicious user profiles into the systems to push or nuke the reputations of targeted items. There are only a small number of labeled users in most of the practical recommender systems, while a large number of users are unlabeled because it is expensive to obtain their identities. In this paper, Semi-SAD, a new semi-supervised learning based shilling attack detection algorithm is proposed to take advantage of both types of data. It first trains a naïve Bayes classifier on a small set of labeled users, and then incorporates unlabeled users with EM-λ to improve the initial naïve Bayes classifier. Experiments on MovieLens datasets are implemented to compare the efficiency of Semi-SAD with supervised learning based detector and unsupervised learning based detector. The results indicate that Semi-SAD can better detect various kinds of shilling attacks than others, especially against obfuscated and hybrid shilling attacks

    Predicting driving direction with weighted markov model

    Full text link
    Driving direction prediction can be useful in different applications such as driver warning and route recommendation. In this paper, a framework is proposed to predict the driving direction based on weighted Markov model. First the city POI (Point of Interesting) map is generated from trajectory data using weighted PageRank algorithm. Then, a weighted Markov model is trained for the near term driving direction prediction based on the POI map and historical trajectories. The experimental results on real-world data set indicate that the proposed method can improve the original Markov prediction model by 10% at some circumstances and 5% overall.<br /

    Extracting Backbones from Weighted Complex Networks with Incomplete Information

    No full text
    The backbone is the natural abstraction of a complex network, which can help people understand a networked system in a more simplified form. Traditional backbone extraction methods tend to include many outliers into the backbone. What is more, they often suffer from the computational inefficiency—the exhaustive search of all nodes or edges is often prohibitively expensive. In this paper, we propose a backbone extraction heuristic with incomplete information (BEHwII) to find the backbone in a complex weighted network. First, a strict filtering rule is carefully designed to determine edges to be preserved or discarded. Second, we present a local search model to examine part of edges in an iterative way, which only relies on the local/incomplete knowledge rather than the global view of the network. Experimental results on four real-life networks demonstrate the advantage of BEHwII over the classic disparity filter method by either effectiveness or efficiency validity

    Fraud prevention in online digital advertising

    No full text
    corecore