Identity Recognition Scheme Based on User Access Behavior

@article{Chen2019IdentityRS,
  title={Identity Recognition Scheme Based on User Access Behavior},
  author={Long Chen and Feiyue Tan},
  journal={2019 IEEE 8th Joint International Information Technology and Artificial Intelligence Conference (ITAIC)},
  year={2019},
  pages={125-129}
}
Users generate a large amount of access data in the process of network interaction, and their access behavior contains rich personal information that can represent the user identities. How to effectively extract personality characteristics from these access behaviors, and establish a user access model, is the key to recognize the user identities. The existing recognition methods are mainly based on face, fingerprint, gait and other biological characteristics, with high recognition accuracy but… CONTINUE READING

Citations

Publications citing this paper.

A Survey of Across Social Networks User Identification

Ling Xing, Kaikai Deng, +3 authors Feifei Gao
  • IEEE Access
  • 2019
VIEW 9 EXCERPTS
HIGHLY INFLUENCED

References

Publications referenced by this paper.
SHOWING 1-10 OF 10 REFERENCES

Overview and discussion on deep learning

Hu Yue, Luo Dongyang, Hua Kui, Lu Haiming, Zhang Xuegong
  • CAAI transactions on intelligent systems, vol. 14, issue 2, 2018. 129
  • 2018
VIEW 1 EXCERPT

Identify user variants based on user behavior on social media

  • 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC)
  • 2015
VIEW 1 EXCERPT

A Kind of Identity Authentication Method Based on Browsing Behaviors

  • 2014 Seventh International Symposium on Computational Intelligence and Design
  • 2014
VIEW 1 EXCERPT

Discovering and visualizing temporal-based Web access behavior

  • The 2005 IEEE/WIC/ACM International Conference on Web Intelligence (WI'05)
  • 2005
VIEW 1 EXCERPT

Jordan Latent Dirichlet Allocation

M David, Blei, Y Andrew, Ng, I Michael
  • Journal of Machine Learning Research, 993-1022,2003.
  • 2003
VIEW 1 EXCERPT