科研成果详情

题名Incremental user modeling of online activity for cyber-i growth with successive browsing logs
作者
发表日期2018-10-26
会议名称16th IEEE International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018
会议录名称Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018
ISBN9781538675182
页码33-40
会议日期August 12-15, 2018
会议地点Athens, Greece
出版者The Institute of Electrical and Electronics Engineers, Inc.
摘要

Cyber-Individual (Cyber-I) is a cyber-counterpart of a real individual (Real-I) in the physical world. It involves a comprehensive description of Real-I and facilitates the digital existence of Real-I in the cyber world. As a copy or digital clone of Real-I, Cyber-I has a life cycle comprising birth, growth, and death processes. One of the basic characteristics of the growth of Cyber-I is to continuously process successive and life-long data for approximation of its Real-I. That is, the model of a Cyber-I should be built incrementally and refined successively. Therefore, this study focuses on an incremental mechanism for a growable Cyber-I. The web browsing logs of a user-as a type of personal data-are collected daily, weekly, and monthly for incremental modeling of the online activity patterns of the user. With incremental processing of the collected data, the model of Cyber-I can be enhanced with detailed and precise feature descriptions of the online activities of the user. A prototype system is implemented to demonstrate the proposed incremental modeling method for Cyber-I growth along with successive data coming and processing. The actual browsing data are used to test and evaluate the developed system.

关键词Browsing logs Cyber-I Growth Incremental modeling Online activity
DOI10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00020
URL查看来源
收录类别CPCI-S
语种英语English
WOS研究方向Computer Science ; Engineering
WOS类目Computer Science, Artificial Intelligence ; Computer Science, Theory & Methods ; Engineering, Electrical & Electronic
WOS记录号WOS:000450146600005
Scopus入藏号2-s2.0-85056828876
引用统计
文献类型会议论文
条目标识符https://repository.uic.edu.cn/handle/39GCC9TT/13496
专题个人在本单位外知识产出
作者单位
1.MoE Key Laboratory of Network and Software Security Assurance,Peking University,Beijing,100-091,China
2.Faculty of Computer and Information Sciences,Hosei University,Tokyo,184-8584,Japan
3.Graduate School of Computer and Information Sciences,Hosei University,Tokyo,184-8584,Japan
推荐引用方式
GB/T 7714
Tsan, Yen,Guo, Ao,Ma, Jianhuaet al. Incremental user modeling of online activity for cyber-i growth with successive browsing logs[C]: The Institute of Electrical and Electronics Engineers, Inc., 2018: 33-40.
条目包含的文件
条目无相关文件。
个性服务
查看访问统计
谷歌学术
谷歌学术中相似的文章
[Tsan, Yen]的文章
[Guo, Ao]的文章
[Ma, Jianhua]的文章
百度学术
百度学术中相似的文章
[Tsan, Yen]的文章
[Guo, Ao]的文章
[Ma, Jianhua]的文章
必应学术
必应学术中相似的文章
[Tsan, Yen]的文章
[Guo, Ao]的文章
[Ma, Jianhua]的文章
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。