2 research outputs found

    ์ง€๋ฆฌ์  ๊ฑฐ๋ฆฌ ์ •๋ณด๋ฅผ ํ™œ์šฉํ•œ ๊ฐ€์งœ ํŒ”๋กœ์›Œ ๊ตฌ๋งค์ž ์‹๋ณ„ ๋ฐฉ๋ฒ•

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (๋ฐ•์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ๊ณต๊ณผ๋Œ€ํ•™ ์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€, 2019. 2. ๊น€์ข…๊ถŒ.The reputation of social media such as Twitter, Facebook, and Instagram now regard as one persons power in real-world. The person who has more friends or followers can influence more individuals. So the influence of users is associated with the number of friends or followers. On the demand of increasing social power, an underground market has emerged where a customer can buy fake followers. The one who purchase fake followers acts vigorously in online social network. Thus, it is hard to distinguish customer from celebrity or cyberstar. Nevertheless, there are unique characteristics of legitimate users that customers or fake followers cannot manipulate such as a small-world property. The small-world property is mainly qualified by the shortest-path and clustering coefficient. In the small-world network, most people are linked by short chains. Existing work has largely focused on extracting relationship features such as indegree, outdegree, status, hub, or authority. Even though these research explored the relationship features to classify abnormal users of fake follower markets, research that utilize the small-world property to detect abnormal users is not studied. In this work, we propose a model that adapt the small-world property. Specifically, we study the geographical distance for 1hop-directional links using nodes geographical location to verify whether a social graph has the small-world property or not. Motivated by the difference of distance ratio for 1hop directional links, we propose a method which is designed to generate 1hop link distance ratio and classify a node as a customer or not. Experimental results on real-world Twitter dataset demonstrates that the proposed method achieves higher performance than existing models.Chapter 1 Introduction 1 1.1 Motivations 1 1.2 Fake Follower Markets 3 1.3 Research Objectives 5 1.4 Contributions 6 1.5 Thesis Organization 8 Chapter 2 Related Work 10 2.1 Small World Phenomenon 10 2.2 Online Social Abusing Attack Detection 11 2.2.1 Contents-based Detection 12 2.2.2 Social Network-based Detection 13 2.2.3 Behavior-based Detection 5 Chapter 3 Characteristic of Customers and Fake Followers 16 3.1 Data Preparation 16 3.2 Fake Follower Properties 21 3.3 Customer Properties 26 Chapter 4 Social Relationship and Geographical Distance 29 4.1 Geographical Distance in OSNs 29 4.2 Follower Ratio 34 Chapter 5 Detecting Customers 38 5.1 Key Features for Customer Detection 38 5.2 Performance matrices 40 5.3 Experiments 41 5.4 Comparison with Baseline Method 44 5.5 Comparison with Feature-based Method 47 5.6 Impact of Balanced Dataset 49 5.7 Fake Follower Detection 50 Chapter 6 Future Work 52 6.1 The Absence of Location Information 52 6.2 Hybrid Detection Method with Link Ratio and Profile Information 54 Chapter 7 Conclusion 56 Bibliography 58 ๊ตญ๋ฌธ์ดˆ๋ก 69Docto

    Using Rank Correlation Coefficient to identify Abnormal Energy Consumption in Buildings

    No full text
    ์—๋„ˆ์ง€ ์ ˆ์•ฝ ๋ฌธ์ œ๋Š” ํ˜„์žฌ๊นŒ์ง€ ํ•ด๊ฒฐ๋˜์ง€ ์•Š์€ ๋ฌธ์ œ์ด๋ฉฐ, ์—๋„ˆ์ง€๋ฅผ ํšจ์œจ์ ์œผ๋กœ ์‚ฌ์šฉํ•˜๊ธฐ ์œ„ํ•ด ์—ฌ๋Ÿฌ ๋ฐฉ ๋ฒ•๋“ค์ด ์ œ์•ˆ๋˜์—ˆ๋‹ค. IT ๊ธฐ์ˆ ์˜ ๋ฐœ๋‹ฌ๊ณผ ๋”๋ถˆ์–ด ์„ผ์„œ, ์˜จ๋„์กฐ์ ˆ์žฅ์น˜, ์—์–ด์ปจ, ์กฐ๋ช… ๋“ฑ์˜ ๊ธฐ๊ธฐ๋“ค์„ ํ†ตํ•ฉํ•˜์—ฌ ๋ชจ๋‹ˆํ„ฐ๋งํ•˜๊ณ  ๊ด€๋ฆฌํ•˜๋Š” ๊ณต์กฐ ์‹œ์Šคํ…œ (HVAC: Heating Ventilation Air Conditioning)์ด ๊ฑด๋ฌผ์— ๋„์ž…๋˜์–ด ํ™œ ์šฉ๋˜๊ณ  ์žˆ์œผ๋ฉฐ, ์ด ์‹œ์Šคํ…œ์„ ํ†ตํ•˜์—ฌ ์—๋„ˆ์ง€ ์†Œ๋น„์˜ ๋ฌธ์ œ์ ์„ ์ฐพ๊ณ  ์—๋„ˆ์ง€๋ฅผ ํšจ์œจ์ ์œผ๋กœ ๊ด€๋ฆฌํ•  ์ˆ˜ ์žˆ๋‹ค. ์—๋„ˆ์ง€ ํšจ์œจ์  ๊ด€๋ฆฌ๋ฅผ ์œ„ํ•˜์—ฌ ์ด์ƒ ํ˜„์ƒ์„ ํšจ์œจ์ ์œผ๋กœ ๊ฐ์ง€ํ•˜๋Š” ๊ฒƒ์— ๋Œ€ํ•œ ๋ฐฉ๋ฒ•๋“ค๋„ ๋งŽ์ด ์—ฐ๊ตฌ๋˜๊ณ  ์žˆ ๋‹ค. ๊ธฐ์กด ์—ฐ๊ตฌ์—์„œ๋Š” ์—๋„ˆ์ง€ ์„ผ์„œ๊ฐ„์˜ ์ „๋ ฅ ์†Œ๋ชจ ํŒจํ„ด์„ 3๊ฐœ์˜ ๋ฐด๋“œ ์˜์—ญ์œผ๋กœ ๋‚˜๋ˆ„์–ด ์ด์ƒ ํ˜„์ƒ์„ ํƒ์ง€ ํ•˜์˜€๋‹ค. ํ•˜์ง€๋งŒ ๊ฐ ๋ฐด๋“œ ์˜์—ญ ๊ฐ„์˜ ๊ด€๊ณ„์— ์น˜์šฐ์ณ ๊ธฐ๊ธฐ๋“ค๊ฐ„์˜ ๋งŽ์€ ๊ด€๊ณ„๋ฅผ ํƒ์ƒ‰ํ•˜์ง€ ๋ชปํ•œ๋‹ค๋Š” ๋‹จ์ ์ด ์žˆ ์—ˆ๋‹ค. ๋”ฐ๋ผ์„œ ๋ณธ ๋…ผ๋ฌธ์€ ์ „๋ ฅ ์†Œ๋ชจ ํŒจํ„ด์— ๋”ฐ๋ผ ๋ฐด๋“œ ์˜์—ญ์„ ๊ตฌ๋ถ„ํ•˜๋Š” ๊ฒƒ์ด ์•„๋‹ˆ๋ผ, ์ „ ๋ฐด๋“œ ์˜์—ญ์—์„œ ๊ฐ ๊ธฐ๊ธฐ๊ฐ„์˜ ์ˆœ์œ„ ๊ด€๊ณ„ ๋ณ€ํ™”๋ฅผ ๊ด€์ฐฐํ•จ์œผ๋กœ์จ ์ด์ƒ ํ˜„์ƒ ํƒ์ง€์˜ ํšจ์œจ์„ฑ์„ ๋†’์ด๋Š” ๋ฐฉ๋ฒ•์„ ์ œ์•ˆํ•˜๊ณ  ์žˆ๋‹ค.์ด ๋…ผ๋ฌธ์€ 2016๋…„๋„ ์ •๋ถ€(๋ฏธ๋ž˜์ฐฝ์กฐ๊ณผํ•™๋ถ€)์˜ ์žฌ์›์œผ ๋กœ ์ •๋ณดํ†ต์‹ ๊ธฐ์ˆ ์ง„ํฅ์„ผํ„ฐ์˜ ์ง€์›์„ ๋ฐ›์•„ ์ˆ˜ํ–‰๋œ ์—ฐ๊ตฌ (No.B0190-16-2017,IoT ๊ธฐ๊ธฐ์˜ ๋ฌผ๋ฆฌ์  ์†์„ฑ, ๊ด€๊ณ„, ์—ญ ํ•  ๊ธฐ๋ฐ˜ Resilient/Fault-Tolerant ์ž์œจ ๋„คํŠธ์›Œํ‚น ๊ธฐ์ˆ  ์—ฐ๊ตฌ) ๋ฐ ๋ฏธ๋ž˜์ฐฝ์กฐ๊ณผํ•™๋ถ€ ๋ฐ ์ •๋ณดํ†ต์‹ ๊ธฐ์ˆ ์ง„ํฅ์„ผํ„ฐ์˜ ๋Œ€ํ•™ICT์—ฐ๊ตฌ์„ผํ„ฐ์œก์„ฑ ์ง€์›์‚ฌ์—…์˜ ์—ฐ๊ตฌ๊ฒฐ๊ณผ๋กœ ์ˆ˜ํ–‰๋˜์—ˆ ์Œ" (IITP-2015-R0992-15-1023)OAIID:RECH_ACHV_DSTSH_NO:A201620368RECH_ACHV_FG:RR00200003ADJUST_YN:EMP_ID:A001118CITE_RATE:DEPT_NM:์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€EMAIL:[email protected]_YN:CONFIRM:
    corecore