A User Classification Solution Based on Users' Reviews

Author(s):  
Feifei Zhao ◽  
Qizhi Qiu ◽  
Wenyan Zhou
Keyword(s):  
Electronics ◽  
2021 ◽  
Vol 10 (7) ◽  
pp. 835
Author(s):  
Ioannis Tsimperidis ◽  
Cagatay Yucel ◽  
Vasilios Katos

Keystroke dynamics are used to authenticate users, to reveal some of their inherent or acquired characteristics and to assess their mental and physical states. The most common features utilized are the time intervals that the keys remain pressed and the time intervals that are required to use two consecutive keys. This paper examines which of these features are the most important and how utilization of these features can lead to better classification results. To achieve this, an existing dataset consisting of 387 logfiles is used, five classifiers are exploited and users are classified by gender and age. The results, while demonstrating the application of these two characteristics jointly on classifiers with high accuracy, answer the question of which keystroke dynamics features are more appropriate for classification with common classifiers.


Author(s):  
Andrew S. Brunker ◽  
Richard R. Rosenkranz ◽  
Anetta Van Itallie ◽  
W. Kerry Mummery ◽  
Quang Vinh Nguyen ◽  
...  

Information ◽  
2021 ◽  
Vol 12 (6) ◽  
pp. 248
Author(s):  
Simone Leonardi ◽  
Giuseppe Rizzo ◽  
Maurizio Morisio

In social media, users are spreading misinformation easily and without fact checking. In principle, they do not have a malicious intent, but their sharing leads to a socially dangerous diffusion mechanism. The motivations behind this behavior have been linked to a wide variety of social and personal outcomes, but these users are not easily identified. The existing solutions show how the analysis of linguistic signals in social media posts combined with the exploration of network topologies are effective in this field. These applications have some limitations such as focusing solely on the fake news shared and not understanding the typology of the user spreading them. In this paper, we propose a computational approach to extract features from the social media posts of these users to recognize who is a fake news spreader for a given topic. Thanks to the CoAID dataset, we start the analysis with 300 K users engaged on an online micro-blogging platform; then, we enriched the dataset by extending it to a collection of more than 1 M share actions and their associated posts on the platform. The proposed approach processes a batch of Twitter posts authored by users of the CoAID dataset and turns them into a high-dimensional matrix of features, which are then exploited by a deep neural network architecture based on transformers to perform user classification. We prove the effectiveness of our work by comparing the precision, recall, and f1 score of our model with different configurations and with a baseline classifier. We obtained an f1 score of 0.8076, obtaining an improvement from the state-of-the-art by 4%.


Symmetry ◽  
2018 ◽  
Vol 10 (9) ◽  
pp. 374 ◽  
Author(s):  
Chi-Hua Chen ◽  
Eyhab Al-Masri ◽  
Feng-Jang Hwang ◽  
Despo Ktoridou ◽  
Kuen-Rong Lo

This editorial introduces the special issue, entitled “Applications of Internet of Things”, of Symmetry. The topics covered in this issue fall under four main parts: (I) communication techniques and applications, (II) data science techniques and applications, (III) smart transportation, and (IV) smart homes. Four papers on sensing techniques and applications are included as follows: (1) “Reliability of improved cooperative communication over wireless sensor networks”, by Chen et al.; (2) “User classification in crowdsourcing-based cooperative spectrum sensing”, by Zhai and Wang; (3) “IoT’s tiny steps towards 5G: Telco’s perspective”, by Cero et al.; and (4) “An Internet of things area coverage analyzer (ITHACA) for complex topographical scenarios”, by Parada et al. One paper on data science techniques and applications is as follows: “Internet of things: a scientometric review”, by Ruiz-Rosero et al. Two papers on smart transportation are as follows: (1) “An Internet of things approach for extracting featured data using an AIS database: an application based on the viewpoint of connected ships”, by He et al.; and (2) “The development of key technologies in applications of vessels connected to the Internet”, by Tian et al. Two papers on smart home are as follows: (1) “A novel approach based on time cluster for activity recognition of daily living in smart homes”, by Liu et al.; and (2) “IoT-based image recognition system for smart home-delivered meal services”, by Tseng et al.


Author(s):  
Dhanalakshmi Teekaraman ◽  
S. Sendhilkumar ◽  
G. S. Mahalakshmi

As web-based social network allows anyone to post the content without any restriction, the trustworthiness of the content creator plays an important role before using the content. An effiective way to find the trustworthiness is, by analyzing the web resources related to the content creator. Therefore the trustworthiness is assessed using the provenance based ontological model called W7 model. Since it is a real time data, the computed trust for each reviewer using the ontological model is uncertain and vague. An appropriate way to classify such data is using the fuzzy logic with gradual trust level. As the computed trust data are feature-based and non-symbolic, the classification ambiguity need to be reduced greatly. This is achieved with the fuzzy decision tree approach, which is a fusion of fuzzy sets with decision tree. The truth of the rule is crucial in trustworthy user classification, as highly truthful rules really increase the credibility of the user in their domain. Therefore, in the proposed model, degree of truth is used as a pruning criteria that classifies the users with minimum number of fuzzy evidence or knowledge. This paper proposes a semantic provenance based gradual trust model to classify the trustworthy reviewers in a book-based social networks using fuzzy decision tree approach. Performance analysis of the proposed model in the terms of classifier accuracy, precision, recall, the number of rules generated and its time complexity are discussed. The analysis shows that the proposed learning model outperforms other classification models. This method is also applied to other data sets and the performance of the classifier is assessed.


Sign in / Sign up

Export Citation Format

Share Document