Computer Science ›› 2019, Vol. 46 ›› Issue (3): 180-187.doi: 10.11896/j.issn.1002-137X.2019.03.027
• Information Security • Previous Articles Next Articles
LI Zhi, MA Chun-lai, MA Tao, SHAN Hong
CLC Number:
[1]SHIKHA A,JITENDRA A.Survey on Anomaly Detection using Data Mining Techniques[J].Procedia Computer Science,2015,60(1):708-713. [2]LIU T B,LIU S P.Fraud detection model & application for credit card acquiring business based on data mining technology[C]∥4th International Conference on Electrical & Electronics Engineering and Computer Science.Atlantis Press,2016. [3]CHRISTIANA I,VASOS V,CHARALAMPOS S.An Intrusion Detection System for Wireless Sensor Networks[C]∥International Conference on Telecommunications.2017. [4]ZHOU J,YANG Y,DING S,et al.A Fault Detection and Health Monitoring Scheme for Ship Propulsion Systems using SVM Technique[J].IEEE Access,2018,PP(99):1. [5]WANG T,HICHEM S.Detection of Abnormal Visual Events via Global Optical Flow Orientation Histogram[J].IEEE Transa-ctions on Information Forensics & Security,2014,9(6):988-998. [6]LI A,MIAO Z J,CEN Y G,et al.Anomaly detection using sparse reconstruction in crowded scenes[J].Multimedia Tools &Applications,2017,76(24):26249-26271. [7]ANIND D,JEFFREY H,EYALDE L,et al.Location-Based Services[J].IEEE Pervasive Computing,2017,9(1):11-12. [8]MAO J L,JIN C Q,ZHANG Z G,et al.Anomaly detection for trajectory big data:Advancements and framework[J].Journal of Software,2017,28(1):17-34.(in Chinese) 毛嘉莉,金澈清,章志刚,等.轨迹大数据异常检测:研究进展及系统框架[J].软件学报,2017,28(1):17-34. [9]ZHENG Y U,LIU Y C,YUAN J,et al.Urban computing with taxicabs[C]∥International Conference on Ubiquitous Computing.ACM,2011. [10]ZHENG Y.Urban computing and large data[J].Communication of China Computer Federation,2013,9(8):8-18.(in Chinese) 郑宇.城市计算与大数据[J].中国计算机学会通讯,2013,9(8):8-18. [11]LIU H P,JIN C Q,ZHOU A Y.Popular Route Planning with Travel Cost Estimation[C]∥Proceedings,Part II,of the 21st International Conference on Database Systems for Advanced Applications-Volume 9643.2016. [12]DUAN X Y,JIN C Q,WANG X L,et al.Real-Time Personali- zed Taxi-Sharing[M].Springer International Publishing,2016. [13]PANG L,CHAWLA S,LIU W,et al.On detection of emerging anomalous traffic patterns using GPS data[J].Data & Know-ledge Engineering,2013,87(9):357-373. [14]REN M Q,SONG R X,WANG M,et al.Detection of Students’ Abnormal Behavior in the Intelligent Campus[J].Natural Science Journal of Harbin Normal University,2017,33(3):20-24.(in Chinese) 任孟其,宋汝鑫,王萌,等.面向智慧校园的学生异常行为检测[J].哈尔滨师范大学自然科学学报,2017,33(3):20-24. [15]DONGHER S,MINGHUNG S,DAVIDC Y,et al.Personal mobility pattern mining and anomaly detection in the GPS era[J].American Cartographer,2016,43(1):55-67. [16]YANG S,ZHOU W B.Anomaly Detection on Collective Moving Patterns:Manifold Learning Based Analysis of Traffic Streams[C]∥IEEE Third International Conference on Privacy,Security,Risk and Trust.2012. [17]PAN B,ZHENG Y,WILKIE D,et al.Crowd sensing of traffic anomalies based on human mobility and social media[C]∥ACM Sigspatial International Conference on Advances in Geographic Information Systems.2013. [18]PANG L,CHAWLA S,LIU W,et al.On detection of emerging anomalous traffic patterns using GPS data[J].Data & Know-ledge Engineering,2013,87(9):357-373. [19]EUNJOON C,SETHA M,JURE L.Friendship and mobility:user movement in location-based social networks[C]∥ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.San Diego,CA,USA,2011. [20]ZHAO G Z,QI J P,YU Y W,et al.Online check-in exception detection in mobile social networking[J].CAAI Transactions on Intelligent Systems,2017,12(5):752-759.(in Chinese) 赵冠哲,齐建鹏,于彦伟,等.移动社交网络异常签到在线检测算法[J].智能系统学报,2017,12(5):752-759. [21]YU Y W,CAO L,ELKEA R,et al.Detecting moving object outliers in massive-scale trajectory streams[C]∥ACM SIGKDD International Conference on Knowledge Discovery and Data Mi-ning.2014:422-431. [22]CRANDALL D J,BACKSTROM L,COSLEY D,et al.Inferring social ties from geographic coincidences[J].Proceedings of the National Academy of Sciences of the United States of America,2010,107(52):22436-22441. [23]TAN R,GU J Z,CHEN P,et al.Link Prediction Using Protected Location History[C]∥Fifth International Conference on Computational and Information Sciences.IEEE,2013. [24]RODRIGUEZ A,LAIO A.Machine learning.Clustering by fast search and find of density peaks[J].Science,2014,344(6191):1492. [25]LIM K,CHAN J,LECKIE C,et al.Detecting Location-centric Communities using Social-Spatial Links with Temporal Constraints[C]∥European Conference on Information Retrieval.2015. [26]CHLO B,VINCENZO N,SALVATORE S,et al.Social and place-focused communities in location-based online social networks[J].European Physical Journal B,2013,86(6):1-10. [27]VISHNU J,KINSHUK B,ANSHU K,et al.Discovering Local Social Groups using Mobility Data[J].International Journal of Computer Applications,2015,120:15-19. [28]MA C L,SHAN H,MA T,et al.An Improved Random Forests Algorithm with Application to Social Ties Inferring of LBS Users[J].Journal of Chinese Computer Systems,2016,37(12):2708-2712.(in Chinese) 马春来,单洪,马涛,等.随机森林改进算法在LBS用户社会关系推断中的应用[J].小型微型计算机系统,2016,37(12):2708-2712. [29]CHEN J,WAN Y.Research on label propagation algorithm based on modularity maximization in the social network[J].Journal on Communications,2017,38(2):25-33.(in Chinese) 陈晶,万云.社交网络中基于模块度最大化的标签传播算法的研究[J].通信学报,2017,38(2):25-33. [30]WANG Z,ZHANG D Q,ZHOU X S,et al.Discovering and Profiling Overlapping Communities in Location-Based Social Networks[J].IEEE Transactions on Systems Man & Cybernetics Systems,2014,44(4):499-509. [31]GUO J,SONG P.Community Discovery with Location-Interaction Disparity in Mobile Social Networks[J].ZTE Communications,2015,13(2):53-61. [32]MA C L,SHAN H,MA T,et al.Random Forests Based Method for Inferring Social Ties of LBS Users[J].Computer Science,2016,43(12):218-222.(in Chinese) 马春来,单洪,马涛,等.一种基于随机森林的LBS用户社会关系判断方法[J].计算机科学,2016,43(12):218-222. [33]ZHENG Y,ZHANG H C,YU Y.Detecting collective anomalies from multiple spatio-temporal datasets across different domains[C]∥Sigspatial International Conference on Advances in Geographic Information Systems.Bellevue,WA,USA:ACM,2015. |
[1] | YU Bin, LI Xue-hua, PAN Chun-yu, LI Na. Edge-Cloud Collaborative Resource Allocation Algorithm Based on Deep Reinforcement Learning [J]. Computer Science, 2022, 49(7): 248-253. |
[2] | YAO Ye, ZHU Yi-an, QIAN Liang, JIA Yao, ZHANG Li-xiang, LIU Rui-liang. Android Malware Detection Method Based on Heterogeneous Model Fusion [J]. Computer Science, 2022, 49(6A): 508-515. |
[3] | WU Cheng-feng, CAI Li, LI Jin, LIANG Yu. Frequent Pattern Mining of Residents’ Travel Based on Multi-source Location Data [J]. Computer Science, 2021, 48(7): 155-163. |
[4] | CAI Li, LI Ying-zi, JIANG Fang, LIANG Yu. Study on Clustering Mining of Imbalanced Data Fusion Towards Urban Hotspots [J]. Computer Science, 2019, 46(8): 16-22. |
[5] | ZHU De-li, YANG De-gang, HU Rong, WAN Hui. Adaptive Multi-level Threshold Binaryzation Method for Optical Character Recognition in Mobile Environment [J]. Computer Science, 2019, 46(8): 315-320. |
[6] | PANG Yu, LIU Ping, LEI Yin-jie. Realization of “Uncontrolled” Object Recognition Algorithm Based on Mobile Terminal [J]. Computer Science, 2019, 46(6A): 153-157. |
[7] | SHI Zhi-kai and ZHU Guo-sheng. WF-C4.5:Handheld Terminal Traffic Identification Method Based on C4.5 Decision Tree in WiFi Environment [J]. Computer Science, 2017, 44(Z6): 270-273. |
[8] | FENG Gu and LI Ni-ge. Model-driven Testing for Mobile Applications [J]. Computer Science, 2017, 44(11): 232-239. |
[9] | DONG Li-peng CHEN Xing-yuan YANG Ying-jie SHI Wang. Implementation and Detection of Network Covert Channel [J]. Computer Science, 2015, 42(7): 216-221. |
[10] | CUI Jian-qun, JIANG Bo and WU Li-bing. Research on Load Balancing Mechanism of Adaptive Mobile Application Layer Multicast Terminal Based on Feedback [J]. Computer Science, 2015, 42(4): 40-43. |
[11] | . Quantitative Analysis and Extracting Arithmetic of Collocations Basic on Typical Patterns [J]. Computer Science, 2012, 39(Z6): 232-234. |
[12] | . Research on Cloud Monitoring Oriented to Mobile Terminal [J]. Computer Science, 2012, 39(8): 55-. |
[13] | . [J]. Computer Science, 2008, 35(2): 65-68. |
[14] | ZHANG Hong-Cai, CHENG Wei-Dong (College of Computer Science ang Technology,Zhejiang University, Hangzhou 311200). [J]. Computer Science, 2007, 34(9): 73-76. |
[15] | . [J]. Computer Science, 2006, 33(6): 79-82. |
|