{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T15:08:33Z","timestamp":1776784113917,"version":"3.51.2"},"reference-count":83,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"University of Malaya Research","award":["(UMRG-RP044C-17HNE)"],"award-info":[{"award-number":["(UMRG-RP044C-17HNE)"]}]},{"name":"\u201cBantuan Kecil\u201d","award":["BKS080-2017"],"award-info":[{"award-number":["BKS080-2017"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2944243","type":"journal-article","created":{"date-parts":[[2019,9,28]],"date-time":"2019-09-28T02:54:13Z","timestamp":1569639253000},"page":"144907-144924","source":"Crossref","is-referenced-by-count":135,"title":["A Survey of User Profiling: State-of-the-Art, Challenges, and Solutions"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1325-2875","authenticated-orcid":false,"given":"Christopher Ifeanyi","family":"Eke","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5420-0452","authenticated-orcid":false,"given":"Azah Anir","family":"Norman","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7907-0671","authenticated-orcid":false,"given":"Liyana","family":"Shuib","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5196-764X","authenticated-orcid":false,"given":"Henry Friday","family":"Nweke","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","first-page":"23","article-title":"Detection of anomalies from user profiles generated from system logs","volume":"116","author":"corney","year":"2011","journal-title":"Proc 9th Australas Inf Secur Conf"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753503"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2003.1167344"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.09.058"},{"key":"ref76","first-page":"99","article-title":"User profiling for interest-focused browsing history","author":"gr?ar","year":"2005","journal-title":"Proceedings of End User Aspects of the Semantic Web"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72524-4_26"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.07.011"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72079-9_3"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3066904"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/959258.959260"},{"key":"ref78","first-page":"225","article-title":"Trust, reputation and user modeling","author":"vassileva","year":"2011","journal-title":"Proc of the Conf on User Modeling Adaption and Personalization"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2015.06.005"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-009-9199-3"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220043"},{"key":"ref31","first-page":"87","article-title":"From tweets to wellness: Wellness event detection from Twitter streams","author":"akbari","year":"2016","journal-title":"Proc 13th AAAI Conf Artif Intell"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2671188.2749381"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009839827683"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(01)00106-3"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1002\/1532-2890(2000)9999:9999<::AID-ASI1615>3.3.CO;2-F"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/345508.345573"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2012.09.002"},{"key":"ref62","first-page":"1","article-title":"A user profiling component with the aid of user ontologies","author":"nebel","year":"2003","journal-title":"Proc Workshop Learn -Teach -Knowl -Adaptivity"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242575"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2008.10.006"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2003.1174242"},{"key":"ref64","first-page":"307","article-title":"Ontologies and knowledge bases towards a terminological clarification","volume":"25","author":"giaretta","year":"1995","journal-title":"Towards Very Large Knowledge Bases Knowledge Building and Knowledge Sharing"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2956573.2956577"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2013.06.008"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.3390\/s8042424"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767726"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.12.034"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.5120\/18888-0179"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.09.012"},{"key":"ref2","article-title":"User profiling trends, techniques and applications","author":"kanoje","year":"2015","journal-title":"arXiv 1503 07474"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72079-9_2"},{"key":"ref20","first-page":"1","article-title":"Overview of the TREC 2005 enterprise track","volume":"5","author":"craswell","year":"2005","journal-title":"Proc TREC"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1277741.1277836"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2015.11.005"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.03.001"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23312-8_17"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988764"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.145"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.12.020"},{"key":"ref51","first-page":"636","article-title":"An attribute selection approach and its application","volume":"2","author":"fuyan","year":"2005","journal-title":"Proc Int Conf Neural Netw Brain"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24211-8"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/1830252.1830264"},{"key":"ref57","first-page":"758","article-title":"A study of selective neighborhood-based na&#x00EF;ve Bayes for efficient lazy learning","author":"xie","year":"2004","journal-title":"Proc 16th IEEE Int Conf Tools Artif Intell"},{"key":"ref56","first-page":"1616","article-title":"Fisher score based naive Bayesian classifier","volume":"3","author":"shi","year":"2005","journal-title":"Proc Int Conf Neural Netw Brain"},{"key":"ref55","first-page":"5","article-title":"Personalised retrieval for online recruitment services","author":"rafter","year":"2000","journal-title":"Proc BCS\/IRSG 22nd Annu Colloq Inf Retr"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44595-1_7"},{"key":"ref53","first-page":"3","article-title":"Supervised machine learning: A review of classification techniques","volume":"160","author":"kotsiantis","year":"2007","journal-title":"Emerg Artif Intell Appl Comput Eng"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1023\/A:1006544522159"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/fi2040533"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888906000397"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2016.08.008"},{"key":"ref12","first-page":"75","article-title":"A survey on user profiling model for anomaly detection in cyberspace","volume":"8","author":"chen","year":"2019","journal-title":"J Cyber Security and Mobility"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36561-3_6"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3191614"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21001"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.10.032"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2187980.2188230"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788610"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.5539\/cis.v6n4p59"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.06.012"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.14232\/actacyb.20.3.2012.4"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.75"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2015.2489657"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/963770.963773"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.12.002"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.06.026"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011117102175"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SITA.2015.7358378"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159691"},{"key":"ref49","first-page":"273","article-title":"That&#x2019;s what friends are for: Inferring location in online social media platforms based on social relationships","volume":"13","author":"jurgens","year":"2013","journal-title":"Proc Int'l AAAI Conf Weblogs and Social Media"},{"key":"ref9","first-page":"31","article-title":"User profile Ontology for the Personalization approach","volume":"41","author":"el allioui","year":"2012","journal-title":"Int J Comput Appl"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/964478.964480"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718519"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.osnem.2018.10.003"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2512208"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2015.09.008"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2011.33"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-1016"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1870096.1870098"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08851141.pdf?arnumber=8851141","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T19:40:28Z","timestamp":1628624428000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8851141\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":83,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2944243","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}