{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:45:07Z","timestamp":1742971507990,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811697081"},{"type":"electronic","value":"9789811697098"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-9709-8_18","type":"book-chapter","created":{"date-parts":[[2022,1,14]],"date-time":"2022-01-14T14:04:45Z","timestamp":1642169085000},"page":"267-280","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on User Identity Authentication Based on Online Behavior Similarity"],"prefix":"10.1007","author":[{"given":"Yong","family":"Li","sequence":"first","affiliation":[]},{"given":"Zhongying","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jingpeng","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,15]]},"reference":[{"issue":"3","key":"18_CR1","first-page":"748","volume":"31","author":"JY Guo","year":"2020","unstructured":"Guo, J.Y., Li, R.H., Zhang, Y., Wang, G.R.: Graph neural network based anomaly detection in dynamic networks. J. Softw. 31(3), 748\u2013762 (2020)","journal-title":"J. Softw."},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Echihabi, K.: High-dimensional vector similarity search: from time series to deep network embeddings. In: Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data, pp. 2829\u20132832 (2020)","DOI":"10.1145\/3318464.3384402"},{"issue":"8","key":"18_CR3","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1007\/s10822-016-9938-8","volume":"30","author":"S Kearnes","year":"2016","unstructured":"Kearnes, S., McCloskey, K., Berndl, M., Pande, V., Riley, P.: Molecular graph convolutions: moving beyond fingerprints. J. Comput. Aided Mol. Des. 30(8), 595\u2013608 (2016)","journal-title":"J. Comput. Aided Mol. Des."},{"issue":"1","key":"18_CR4","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1038\/srep00335","volume":"2","author":"L Weng","year":"2012","unstructured":"Weng, L., Flammini, A., Vespignani, A., Menczer, F.: Competition among memes in a world with limited attention. Sci. Rep. 2(1), 335 (2012)","journal-title":"Sci. Rep."},{"issue":"6","key":"18_CR5","doi-asserted-by":"publisher","first-page":"1175","DOI":"10.1007\/s11390-015-1592-4","volume":"30","author":"Y Li","year":"2015","unstructured":"Li, Y., Zhang, J., Meng, X.-F., Wang, C.-Q.: Quantifying the influence of websites based on online collective attention flow. J. Comput. Sci. Technol. 30(6), 1175\u20131187 (2015)","journal-title":"J. Comput. Sci. Technol."},{"issue":"9","key":"18_CR6","doi-asserted-by":"publisher","first-page":"e0136243","DOI":"10.1371\/journal.pone.0136243","volume":"10","author":"P Shi","year":"2015","unstructured":"Shi, P., Huang, X., Wang, J., Jiang, Z., Wu, Y.: A geometric representation of collective attention flows. PLOS ONE 10(9), e0136243 (2015)","journal-title":"PLOS ONE"},{"issue":"5","key":"18_CR7","doi-asserted-by":"publisher","first-page":"059102","DOI":"10.1007\/s11432-015-0567-9","volume":"60","author":"Y Li","year":"2017","unstructured":"Li, Y., Meng, X.F., Zhang, Q., Zhang, J., Wang, C.Q.: Common patterns of online collective attention flow. Sci. China Inf. Sci. 60(5), 059102 (2017)","journal-title":"Sci. China Inf. Sci."},{"key":"18_CR8","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1016\/j.knosys.2015.09.008","volume":"8","author":"X Tang","year":"2015","unstructured":"Tang, X., Miao, Q.G., Quan, Y.N., Tang, J., Deng, K.: Predicting individual retweet behavior by user similarity: a multi-task learning approach. Knowl.-Based Syst. 8, 681\u2013688 (2015)","journal-title":"Knowl.-Based Syst."},{"key":"18_CR9","unstructured":"Esuli, A., Petry, L.M., Renso, C., Bogomy, V.: Traj2User: exploiting embeddings for computing similarity of users mobile behavior (2018). https:\/\/arxiv.org\/abs\/1808.00554. Accessed 10 Oct 2021"},{"issue":"1","key":"18_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/17517575.2019.1686655","volume":"14","author":"HD Zhong","year":"2019","unstructured":"Zhong, H.D., Lyu, H.B., Zhang, S.D., Ping, L., Justin, Z., Li, X.: Measuring user similarity using check-ins from LBSN: a mobile recommendation approach for e-commerce and security services. Enterp. Inf. Syst. 14(1), 1\u201320 (2019). https:\/\/doi.org\/10.1080\/17517575.2019.1686655","journal-title":"Enterp. Inf. Syst."},{"issue":"1","key":"18_CR11","doi-asserted-by":"publisher","first-page":"266","DOI":"10.2991\/ijcis.d.201126.002","volume":"14","author":"MS Bhuvaneswari","year":"2020","unstructured":"Bhuvaneswari, M.S., Muneeswaran, K.: User community detection from web server log using between user similarity metric. Int. J. Comput. Intell. Syst. 14(1), 266 (2020)","journal-title":"Int. J. Comput. Intell. Syst."},{"issue":"3","key":"18_CR12","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1080\/10919392.2020.1742552","volume":"30","author":"XD Qian","year":"2020","unstructured":"Qian, X.D., Li, M.: E-commerce user type recognition based on access sequence similarity. J. Organ. Comput. Electron. Commer. 30(3), 209\u2013223 (2020)","journal-title":"J. Organ. Comput. Electron. Commer."},{"key":"18_CR13","doi-asserted-by":"publisher","unstructured":"Jia, Z.S., Han, Z.: Research and analysis of user behavior fingerprint on security situational awareness based on DNS Log. In: 6th International Conference on Behavioral, Economic and Socio-Cultural Computing, pp. 1\u20134 (2019). https:\/\/doi.org\/10.1109\/BESC48373.2019.8963120","DOI":"10.1109\/BESC48373.2019.8963120"},{"key":"18_CR14","unstructured":"Duvenaud, D., et al.: Convolutional networks on graphs for learning molecular fingerprints. In: Proceedings of the 28th International Conference on Neural Information Processing Systems, pp. 2224\u20132232 (2015)"},{"issue":"2","key":"18_CR15","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1039\/C7SC02664A","volume":"9","author":"Z Wu","year":"2018","unstructured":"Wu, Z., et al.: MoleculeNet: a benchmark for molecular machine learning. Chem. Sci. 9(2), 513\u2013530 (2018)","journal-title":"Chem. Sci."},{"key":"18_CR16","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.ymeth.2014.08.005","volume":"71","author":"A Cereto-Massagu\u00e9","year":"2015","unstructured":"Cereto-Massagu\u00e9, A., Montes, M., Valls, C., Mulero, M., Garcia-Vallve, S., Pujadas, G.: Molecular fingerprint similarity search in virtual screening. Methods 71, 58\u201363 (2015)","journal-title":"Methods"},{"issue":"9","key":"18_CR17","doi-asserted-by":"publisher","first-page":"1616","DOI":"10.1109\/TKDE.2018.2807452","volume":"30","author":"H Cai","year":"2017","unstructured":"Cai, H., Zheng, V.W., Chang, C.C.: A comprehensive survey of graph embedding: problems, techniques and applications. IEEE Trans. Knowl. Data Eng. 30(9), 1616\u20131637 (2017)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Satish, N., et al.: Navigating the maze of graph analytics frameworks using massive graph datasets. In: Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, pp. 979\u2013990 (2014)","DOI":"10.1145\/2588555.2610518"},{"issue":"8","key":"18_CR19","doi-asserted-by":"publisher","first-page":"1798","DOI":"10.1109\/TPAMI.2013.50","volume":"35","author":"Y Bengio","year":"2013","unstructured":"Bengio, Y., Courville, A., Vincent, P.: Representation learning: a review and new perspectives. IEEE Trans. Pattern Anal. Mach. Intell. 35(8), 1798\u20131828 (2013)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Wang, D.X., Cui, P., Zhu, W.W.: Structural deep network embedding. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1225\u20131234 (2016)","DOI":"10.1145\/2939672.2939753"},{"key":"18_CR21","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.knosys.2018.03.022","volume":"151","author":"P Goyal","year":"2017","unstructured":"Goyal, P., Ferrara, E.: Graph embedding techniques, applications, and performance: a survey. Knowl.-Based Syst. 151, 78\u201394 (2017)","journal-title":"Knowl.-Based Syst."},{"key":"18_CR22","unstructured":"Narayanan, A., Chandramohan, M., Venkatesan, R., Chen, L.H, Liu, Y., Jaiswal, S.: graph2vec: Learning Distributed Representations of Graphs (2017). https:\/\/arxiv.org\/abs\/1707.05005. Accessed 10 Oct 2021"},{"key":"18_CR23","unstructured":"Le, Q., Mikolov, T.: Distributed representations of sentences and documents. In: Proceedings of the 31st International Conference on Machine Learning, pp. 1188\u20131196 (2014)"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Grohe, M.: word2vec, node2vec, graph2vec, X2vec: towards a theory of vector embeddings of structured data. In: Proceedings of the 39th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, pp. 1\u201320 (2020)","DOI":"10.1145\/3375395.3387641"}],"container-title":["Communications in Computer and Information Science","Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-9709-8_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,18]],"date-time":"2024-07-18T08:05:48Z","timestamp":1721289948000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-9709-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811697081","9789811697098"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-9709-8_18","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"15 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BigData","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"CCF Conference on Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 January 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 January 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bigdat2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.bigdata2021.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT Microsoft","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic BigData 2021 has been postponed to 2022.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}