User Behavior Analysis

On the Activity Privacy of Blockchain for IoT

Authors: Ali Dorri, Clemence Roulin, Raja Jurdak, Salil Kanhere | Published: 2018-12-21 | Updated: 2019-03-14
IoT Traffic Characteristics
User Behavior Analysis
Attack Detection

IoTSense: Behavioral Fingerprinting of IoT Devices

Authors: Bruhadeshwar Bezawada, Maalvika Bachani, Jordan Peterson, Hossein Shirazi, Indrakshi Ray, Indrajit Ray | Published: 2018-04-11
User Behavior Analysis
User Behavior Analysis
Communication Analysis

Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection

Authors: Andy Brown, Aaron Tuor, Brian Hutchinson, Nicole Nichols | Published: 2018-03-13
Data Generation Method
User Behavior Analysis
Machine Learning Framework

Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning

Authors: Wei-Han Lee, Ruby B. Lee | Published: 2017-08-30
Sensor Information Management
Privacy Protection Method
User Behavior Analysis

Knock Knock, Who’s There? Membership Inference on Aggregate Location Data

Authors: Apostolos Pyrgelis, Carmela Troncoso, Emiliano De Cristofaro | Published: 2017-08-21 | Updated: 2017-11-29
Privacy Protection Method
Privacy Loss Analysis
User Behavior Analysis

Continuous User Authentication via Unlabeled Phone Movement Patterns

Authors: Rajesh Kumar, Partha Pratim Kundu, Diksha Shukla, Vir V. Phoha | Published: 2017-08-15
Data Collection Method
Model Performance Evaluation
User Behavior Analysis

Fake News Detection on Social Media: A Data Mining Perspective

Authors: Kai Shu, Amy Sliva, Suhang Wang, Jiliang Tang, Huan Liu | Published: 2017-08-07 | Updated: 2017-09-03
Dissemination of Misinformation on SNS
User Behavior Analysis
Detection of Misinformation

Robust Smartphone App Identification Via Encrypted Network Traffic Analysis

Authors: Vincent F. Taylor, Riccardo Spolaor, Mauro conti, Ivan Martinovic | Published: 2017-04-20
Application Classification Method
User Behavior Analysis
Performance Evaluation Metrics