{"id":"https://openalex.org/W3048520001","doi":"https://doi.org/10.1109/infocomwkshps50562.2020.9162688","title":"Instagram User Behavior Identification Based on Multidimensional Features","display_name":"Instagram User Behavior Identification Based on Multidimensional Features","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3048520001","doi":"https://doi.org/10.1109/infocomwkshps50562.2020.9162688","mag":"3048520001"},"language":"en","primary_location":{"id":"doi:10.1109/infocomwkshps50562.2020.9162688","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps50562.2020.9162688","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032328549","display_name":"Hua Wu","orcid":"https://orcid.org/0000-0002-8829-0182"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Hua Wu","raw_affiliation_strings":["Key Laboratory of Computer Network Technology of Jiangsu Province, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Computer Network Technology of Jiangsu Province, Nanjing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055915232","display_name":"Qiuyan Wu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qiuyan Wu","raw_affiliation_strings":["Key Laboratory of Computer Network Technology of Jiangsu Province, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Computer Network Technology of Jiangsu Province, Nanjing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043707940","display_name":"Guang Cheng","orcid":"https://orcid.org/0000-0001-8642-4362"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Guang Cheng","raw_affiliation_strings":["Key Laboratory of Computer Network Technology of Jiangsu Province, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Computer Network Technology of Jiangsu Province, Nanjing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051015375","display_name":"Shuyi Guo","orcid":"https://orcid.org/0000-0001-7860-0661"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shuyi Guo","raw_affiliation_strings":["Key Laboratory of Computer Network Technology of Jiangsu Province, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Computer Network Technology of Jiangsu Province, Nanjing, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5032328549"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.6628,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.75891695,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1111","last_page":"1116"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7574092149734497},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7486861944198608},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.6314651370048523},{"id":"https://openalex.org/keywords/feature-vector","display_name":"Feature vector","score":0.6155928373336792},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5580833554267883},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.5525604486465454},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5092731714248657},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3935837149620056},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3684045970439911},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28676068782806396}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7574092149734497},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7486861944198608},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.6314651370048523},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.6155928373336792},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5580833554267883},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.5525604486465454},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5092731714248657},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3935837149620056},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3684045970439911},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28676068782806396},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocomwkshps50562.2020.9162688","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps50562.2020.9162688","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5400000214576721}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W47191821","https://openalex.org/W256930182","https://openalex.org/W1536592145","https://openalex.org/W1577231857","https://openalex.org/W1982728146","https://openalex.org/W2048702750","https://openalex.org/W2115775347","https://openalex.org/W2188471597","https://openalex.org/W2263270445","https://openalex.org/W2277710627","https://openalex.org/W2295321789","https://openalex.org/W2343004508","https://openalex.org/W2467159119","https://openalex.org/W2506891351","https://openalex.org/W2605422749","https://openalex.org/W2606697812","https://openalex.org/W2743678626","https://openalex.org/W2751991020","https://openalex.org/W2794517996","https://openalex.org/W2892151818","https://openalex.org/W2892711130","https://openalex.org/W2901530347","https://openalex.org/W2919493784","https://openalex.org/W2963750397","https://openalex.org/W3124891265","https://openalex.org/W6601927984","https://openalex.org/W6724655065","https://openalex.org/W6760909618"],"related_works":["https://openalex.org/W2090763504","https://openalex.org/W148178222","https://openalex.org/W2104657898","https://openalex.org/W1948992892","https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W1886884218","https://openalex.org/W1910826599","https://openalex.org/W2012353789","https://openalex.org/W2530420969"],"abstract_inverted_index":{"The":[0,39,114],"development":[1],"of":[2,19,48,70,77,90],"smartphones":[3],"and":[4,94,124],"social":[5],"networks":[6],"has":[7],"brought":[8],"great":[9],"convenience":[10],"to":[11,15,35,65,85],"our":[12],"lives.":[13],"Due":[14],"the":[16,45,67,75,87,96,111],"increasing":[17],"requirements":[18],"user":[20,22,41,108],"privacy,":[21],"data":[23],"are":[24],"protected":[25],"by":[26],"encryption":[27],"protocol.":[28],"But":[29],"it":[30,33],"also":[31],"makes":[32],"difficult":[34],"regulate":[36],"malicious":[37],"behavior.":[38],"existing":[40],"behavior":[42,109],"identification":[43],"adopts":[44],"statistical":[46],"features":[47,69],"encrypted":[49,71],"traffic,":[50],"which":[51],"fluctuates":[52],"greatly":[53],"in":[54,110],"different":[55],"transmission":[56],"environments.":[57],"In":[58],"this":[59],"paper,":[60],"we":[61,80],"propose":[62],"a":[63],"method":[64],"obtain":[66],"stable":[68,92],"traffic.":[72],"Based":[73],"on":[74,106,129],"principle":[76],"maximum":[78],"entropy,":[79],"put":[81],"forward":[82],"an":[83],"approach":[84],"divide":[86],"distribution":[88],"ranges":[89],"these":[91],"features,":[93],"map":[95],"feature":[97],"space":[98],"into":[99],"SVM":[100],"vector":[101],"space.":[102],"Our":[103],"research":[104],"focuses":[105],"multiple":[107],"Instagram":[112],"application.":[113],"evaluation":[115],"results":[116],"achieve":[117],"99.8%":[118],"accuracy,":[119],"99.3%":[120,122],"precision,":[121],"recall,":[123],"0.09%":[125],"false":[126],"positive":[127],"rate(FPR)":[128],"average.":[130]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
