Computer Science ›› 2023, Vol. 50 ›› Issue (3): 114-120.doi: 10.11896/jsjkx.211200287

• Database & Big Data & Data Science • Previous Articles     Next Articles

Cross-network User Identification Based on Multiple Spatio-Temporal Trajectory Features

LIU Hong1, ZHU Yan1, LI Chunping2   

  1. 1 School of Computing and Artificial Intelligence,Southwest Jiaotong University,Chengdu 611756,China
    2 School of Software,Tsinghua University,Beijing 100091,China
  • Received:2021-12-27 Revised:2022-04-14 Online:2023-03-15 Published:2023-03-15
  • About author:LIU Hong,born in 1995,postgraduate.Her main research interests include cross-network user identification and data mining.
    ZHU Yan,born in 1965,Ph.D,professor,Ph.D co-supervisor,is a member of China Computer Federation.Her main research interests include Web data mining,social networking,privacy preserving,deep learning and AI.
  • Supported by:
    Sichuan Science and Technology Project(2019YFSY0032).

Abstract: With the flourishing of location-based social networks,users’mobile behavior data has been greatly enriched,which promotes the research on user identification based on spatio-temporal data.User identification in cross-location social networks emphasizes learning the correlation between time and space sequences of different platforms,aiming at discovering the accounts registered by the same user on different platforms.In order to solve the problems of data sparsity,low quality and spatio-temporal mismatch faced by existing researches,a recognition algorithm UI-STDD combining bidirectional spatio-temporal dependence and spatio-temporal distribution is proposed.The algorithm mainly consists of three modules:the space-time sequence module is combined with the bidirectional long short-term memory network of paired attention to describe user movement patterns;the time preference module defines the user personalized mode from coarse and fine granularity;the spatial location module mines local and global information of location points to quantify spatial proximity.Based on the user trajectory pair features obtained by the above modules,a multi-layer feedforward network is used in UI-STDD to distinguish whether two accounts across the network corres-pond to the same person in real life.To verify the feasibility and effectiveness of UI-STDD,experiments are carried out on three publicly available datasets.Experimental results show that the proposed algorithm can improve the user identification rate based on spatio-temporal data,and the average F1 value is more than 10% higher than the optimal comparison method.

Key words: User identification, Spatio-Temporal data, Mobile mode, Time preference, Long short-term memory

CLC Number: 

  • TP301
[1]LUO Y T,LIU Q,LIU Z C.STAN:Spatio-Temporal Attention Network for Next Location Recommendation[C]//Proceedings of the Web Conference.New York:ACM,2021:2177-2185.
[2]SINA D,CHANG T L,KEVIN H,et al.Semi-Supervised Deep Learning Approach for Transportation Mode Identification Using GPS Trajectory Data[J].IEEE Transactions on Know-ledge and Data Engineering,2020,32(5):1010-1023.
[3]GUO Y S,LIU M D.Anomaly detection based on spatio-temporal trajectory data[J].Computer Science,2021,48(S1):213-219.
[4]CHEN W,YIN H Z,WANG W Q,et al.Effective And Efficient User Account Linkage Across Location Based Social Networks[C]//IEEE 34th International Conference on Data Enginee-ring.New York:IEEE Press,2018:1085-1096.
[5]ZHOU X P,LIANG X,ZHAO J C,et al.A review of relateduser mining methods for social network convergence[J].Journal of Software,2017,28(6):1565-1583.
[6]LI H,CAO S Y,CHEN Y Z,et al.User Trajectory Identification Model via Attention Mechanism[J].Computer Science,2021,49(3):308-312.
[7]FARID M N,JAVKRICHAN U,PATRICK T,et al.WhereYou Are Is Who You Are:User Identification by Matching Statistics[J].IEEE Transactions on Information Forensics and Security,2016,11(2):358-372.
[8]RIEDERER C,KIM Y S,CHAINTREAU A,et al.LinkingUsers Across Domains with Location Data:Theory and Validation[C]//World Wide Web.New York:ACM,2016:707-719.
[9]WANG H D,GAO C,LI Y,et al.De-anonymization of Mobility Trajectories:Dissecting the Gaps between Theory and Practice[J].IEEE Transactions on Mobile Computing,2021,20(3):796-815.
[10]FENG J,ZHANG M Y,WANG H D,et al.DPLink:User Identity Linkage via Deep Neural Network From Heterogeneous Mobility Data[C]//World Wide Web.New York:ACM,2019:459-469.
[11]LUCA R,MIRCO M.It's the way you check-in:Identifyingusers in location-based social networks[C]//Proceedings of the Second ACM Conference on Online Social Networks.New York:ACM,2014:215-226.
[12]ALKET C,MARCO M,FRANCO Z.Re-identifification and information fusion between anonymized CDR and social network data[J].Journal Ambient Intelligent Human Computing,2016,7(1):83-96.
[13]DING F X,MA X Q,YANG Y,et al.User Identity Linkage across Location-Based Social Networks with Spatio-Temporal Check-in Patterns[C]//IEEE International Conference on Pa-rallel & Computing & Communications.New York:IEEE Press,2020:1278-1285.
[14]LI X L,ZHAO K Q,CONG C,et al.Deep RepresentationLearning for Trajectory Similarity Computation[C]//IEEE 34th International Conference on Data Engineering.New York:IEEE Press,2018:617-628.
[15]XI D B,ZHUANG F Z,LIU Y C,et al.Modelling of Bi-Directional Spatio-Temporal Dependence and Users’ Dynamic Prefe-rences for Missing POI Check-In Identification[C]//Proceedings of the AAAI Conference on Artificial Intelligence.Palo Alto:AAAI Press,2019:5458-5465.
[16]CHEN W,WANG W Q,YIN H Z,et al.User Account Linkage Across Multiple Platforms with Location Data[J].Journal of Computer Science and Technology,2020,35:751-768.
[17]KONG X G,ZHANG J W,PHILIP S Y,Inferring anchor links across multiple heterogeneous social networks[C]//Proceedings of the 22nd ACM International Conference on Information & Knowledge Management.New York:ACM,2013:179-188.
[18]ZHANG J W,PHILIP S Y.Integrated Anchor and Social Link Predictions across Social Networks[C]//Proceeding of the 24th International Joint Conference on Artificial Intelligence.California:Morgan Kaufmann,2015:2125-2132.
[19]CHO E,MYERS S A,LESKOVES J.Friendship and Mobility:Friendship and Mobility:User Movement in Location-Based Social Networks[C]//ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.New York:ACM,2011:1082-1090.
[20]MIAO C C,WANG J L,YU H,et al.Trajectory-User Linking with Attentive Recurrent Network[C]//Proceeding of the 19th International Conference on Autonomous Agents and Multi Agent Systems.Richland:Springer,2020:878-886.
[1] WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322.
[2] LI Rong-fan, ZHONG Ting, WU Jin, ZHOU Fan, KUANG Ping. Spatio-Temporal Attention-based Kriging for Land Deformation Data Interpolation [J]. Computer Science, 2022, 49(8): 33-39.
[3] KANG Yan, XU Yu-long, KOU Yong-qi, XIE Si-yu, YANG Xue-kun, LI Hao. Drug-Drug Interaction Prediction Based on Transformer and LSTM [J]. Computer Science, 2022, 49(6A): 17-21.
[4] WANG Fei, HUANG Tao, YANG Ye. Study on Machine Learning Algorithms for Life Prediction of IGBT Devices Based on Stacking Multi-model Fusion [J]. Computer Science, 2022, 49(6A): 784-789.
[5] WANG Shan, XU Chu-yi, SHI Chun-xiang, ZHANG Ying. Study on Cloud Classification Method of Satellite Cloud Images Based on CNN-LSTM [J]. Computer Science, 2022, 49(6A): 675-679.
[6] PAN Zhi-hao, ZENG Bi, LIAO Wen-xiong, WEI Peng-fei, WEN Song. Interactive Attention Graph Convolutional Networks for Aspect-based Sentiment Classification [J]. Computer Science, 2022, 49(3): 294-300.
[7] LI Hao, CAO Shu-yu, CHEN Ya-qing, ZHANG Min. User Trajectory Identification Model via Attention Mechanism [J]. Computer Science, 2022, 49(3): 308-312.
[8] SONG Mei-qi, FU Xiang-ling, YAN Chen-wei, WU Wei-qiang, REN Yun. Prediction Model of Enterprise Resilience Based on Bi-directional Long Short-term Memory Network [J]. Computer Science, 2022, 49(11): 197-205.
[9] WANG Ru-bin, LI Rui-yuan, HE Hua-jun, LIU Tong, LI Tian-rui. Distributed Distance Join Algorithm for Massive Spatial Data [J]. Computer Science, 2022, 49(1): 95-100.
[10] LIU Meng-yang, WU Li-juan, LIANG Hui, DUAN Xu-lei, LIU Shang-qing, GAO Yi-bo. A Kind of High-precision LSTM-FC Atmospheric Contaminant Concentrations Forecasting Model [J]. Computer Science, 2021, 48(6A): 184-189.
[11] DING Ling, XIANG Yang. Chinese Event Detection with Hierarchical and Multi-granularity Semantic Fusion [J]. Computer Science, 2021, 48(5): 202-208.
[12] LIU Jia-chen, QIN Xiao-lin, ZHU Run-ze. Prediction of RFID Mobile Object Location Based on LSTM-Attention [J]. Computer Science, 2021, 48(3): 188-195.
[13] LIU Qi, CHEN Hong-mei, LUO Chuan. Method for Prediction of Red Blood Cells Supply Based on Improved Grasshopper Optimization Algorithm [J]. Computer Science, 2021, 48(2): 224-230.
[14] PENG Bin, LI Zheng, LIU Yong, WU Yong-hao. Automatic Code Comments Generation Method Based on Convolutional Neural Network [J]. Computer Science, 2021, 48(12): 117-124.
[15] LI Hao, WANG Fei, XIE Si-yu, KOU Yong-qi, ZHANG Lan, YANG Bing, KANG Yan. Dual Autoregressive Components Traffic Prediction Based on Improved Graph WaveNet [J]. Computer Science, 2021, 48(11A): 159-165.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!