دورية أكاديمية

DeepScan: Exploiting Deep Learning for Malicious Account Detection in Location-Based Social Networks.

التفاصيل البيبلوغرافية
العنوان: DeepScan: Exploiting Deep Learning for Malicious Account Detection in Location-Based Social Networks.
المؤلفون: Gong, Qingyuan, Chen, Yang, He, Xinlei, Zhuang, Zhou, Wang, Tianyi, Huang, Hong, Wang, Xin, Fu, Xiaoming
المصدر: IEEE Communications Magazine; Nov2018, Vol. 56 Issue 11, p21-27, 7p
مصطلحات موضوعية: DEEP learning, LOCATION-based services, SOCIAL networks, ARTIFICIAL neural networks, USER-generated content
مستخلص: Our daily lives have been immersed in widespread location-based social networks (LBSNs). As an open platform, LBSNs typically allow all kinds of users to register accounts. Malicious attackers can easily join and post misleading information, often with the intention of influencing users' decisions in urban computing environments. To provide reliable information and improve the experience for legitimate users, we design and implement DeepScan, a malicious account detection system for LBSNs. Different from existing approaches, DeepScan leverages emerging deep learning technologies to learn users' dynamic behavior. In particular, we introduce the long short-term memory (LSTM) neural network to conduct time series analysis of user activities. DeepScan combines newly introduced time series features and a set of conventional features extracted from user activities, and exploits a supervised machine-learning-based model for detection. Using real traces collected from Dianping, a representative LBSN, we demonstrate that DeepScan can achieve excellent prediction performance with an F1-score of 0.964. We also find that the time series features play a critical role in the detection system. [ABSTRACT FROM AUTHOR]
Copyright of IEEE Communications Magazine is the property of IEEE and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
قاعدة البيانات: Complementary Index
الوصف
تدمد:01636804
DOI:10.1109/MCOM.2018.1700575