题名 | Incremental user modeling of online activity for cyber-i growth with successive browsing logs |
作者 | |
发表日期 | 2018-10-26 |
会议名称 | 16th IEEE International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018 |
会议录名称 | Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018
![]() |
ISBN | 9781538675182 |
页码 | 33-40 |
会议日期 | August 12-15, 2018 |
会议地点 | Athens, Greece |
出版者 | The Institute of Electrical and Electronics Engineers, Inc. |
摘要 | Cyber-Individual (Cyber-I) is a cyber-counterpart of a real individual (Real-I) in the physical world. It involves a comprehensive description of Real-I and facilitates the digital existence of Real-I in the cyber world. As a copy or digital clone of Real-I, Cyber-I has a life cycle comprising birth, growth, and death processes. One of the basic characteristics of the growth of Cyber-I is to continuously process successive and life-long data for approximation of its Real-I. That is, the model of a Cyber-I should be built incrementally and refined successively. Therefore, this study focuses on an incremental mechanism for a growable Cyber-I. The web browsing logs of a user-as a type of personal data-are collected daily, weekly, and monthly for incremental modeling of the online activity patterns of the user. With incremental processing of the collected data, the model of Cyber-I can be enhanced with detailed and precise feature descriptions of the online activities of the user. A prototype system is implemented to demonstrate the proposed incremental modeling method for Cyber-I growth along with successive data coming and processing. The actual browsing data are used to test and evaluate the developed system. |
关键词 | Browsing logs Cyber-I Growth Incremental modeling Online activity |
DOI | 10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00020 |
URL | 查看来源 |
收录类别 | CPCI-S |
语种 | 英语English |
WOS研究方向 | Computer Science ; Engineering |
WOS类目 | Computer Science, Artificial Intelligence ; Computer Science, Theory & Methods ; Engineering, Electrical & Electronic |
WOS记录号 | WOS:000450146600005 |
Scopus入藏号 | 2-s2.0-85056828876 |
引用统计 | |
文献类型 | 会议论文 |
条目标识符 | https://repository.uic.edu.cn/handle/39GCC9TT/13496 |
专题 | 个人在本单位外知识产出 |
作者单位 | 1.MoE Key Laboratory of Network and Software Security Assurance,Peking University,Beijing,100-091,China 2.Faculty of Computer and Information Sciences,Hosei University,Tokyo,184-8584,Japan 3.Graduate School of Computer and Information Sciences,Hosei University,Tokyo,184-8584,Japan |
推荐引用方式 GB/T 7714 | Tsan, Yen,Guo, Ao,Ma, Jianhuaet al. Incremental user modeling of online activity for cyber-i growth with successive browsing logs[C]: The Institute of Electrical and Electronics Engineers, Inc., 2018: 33-40. |
条目包含的文件 | 条目无相关文件。 |
个性服务 |
查看访问统计 |
谷歌学术 |
谷歌学术中相似的文章 |
[Tsan, Yen]的文章 |
[Guo, Ao]的文章 |
[Ma, Jianhua]的文章 |
百度学术 |
百度学术中相似的文章 |
[Tsan, Yen]的文章 |
[Guo, Ao]的文章 |
[Ma, Jianhua]的文章 |
必应学术 |
必应学术中相似的文章 |
[Tsan, Yen]的文章 |
[Guo, Ao]的文章 |
[Ma, Jianhua]的文章 |
相关权益政策 |
暂无数据 |
收藏/分享 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论