ﻻ يوجد ملخص باللغة العربية
Mobile devices have evolved from just communication devices into an indispensable part of peoples lives in form of smartphones, tablets and smart watches. Devices are now more personal than ever and carry more information about a person than any other. Extracting user behaviour is rather difficult and time-consuming as most of the work previously has been manual or requires feature extraction. In this paper, a novel approach of user behavior detection is proposed with Deep Learning Network (DNN). Initial approach was to use recurrent neural network (RNN) along with LSTM for completely unsupervised analysis of mobile devices. Next approach is to extract features by using Long Short Term Memory (LSTM) to understand the user behaviour, which are then fed into the Convolution Neural Network (CNN). This work mainly concentrates on detection of user behaviour and anomaly detection for usage analysis of mobile devices. Both the approaches are compared against some baseline methods. Experiments are conducted on the publicly available dataset to show that these methods can successfully capture the user behaviors.
In this paper we present the first population-level, city-scale analysis of application usage on smartphones. Using deep packet inspection at the network operator level, we obtained a geo-tagged dataset with more than 6 million unique devices that la
Gamification represents an effective way to incentivize user behavior across a number of computing applications. However, despite the fact that physical activity is essential for a healthy lifestyle, surprisingly little is known about how gamificatio
All mobile devices are energy-constrained. They use batteries that allows using the device for a limited amount of time. In general, energy attacks on mobile devices are denial of service (DoS) type of attacks. While previous studies have analyzed th
In todays world of big data, computational analysis has become a key driver of biomedical research. Recent exponential growth in the volume of available omics data has reshaped the landscape of contemporary biology, creating demand for a continuous f
In this paper, we propose to identify compromised mobile devices from a network administrators point of view. Intuitively, inadvertent users (and thus their devices) who download apps through untrustworthy markets are often allured to install malicio