This work is licensed under the Creative Commons Attribution 4.0 International License.
Gotlieb, M. R., & Cheema, S. E. (2017). From consumer to producer: motivations, internet use, and political consumerism. Information Communication & Society, 20(3-4), 570-586.Search in Google Scholar
Wang, Y. S. (2019). User experiences in live video streaming: a netnography analysis. Internet Research.Search in Google Scholar
Li, W., Lu, Y., Ma, J., & Wang, B. (2023). Users’ subsequent innovation after organizational adoption: evidence from an online game user innovation community. Internet Research, 33(4), 1446-1472.Search in Google Scholar
Zhao, XuanBhuiyan, Md Zakirul AlamQi, LianyongNie, HongliTang, WendaDou, Wanchun. (2020). Trcmp: a dependable app usage inference design for user behavior analysis through cyber-physical parameters. Journal of systems architecture, 102.Search in Google Scholar
Zhu, Z., Zhou, T., Jia, C., Liu, W., Liu, B., & Cao, J. (2020). Community detection across multiple social networks based on overlapping users. Transactions on Emerging Telecommunications Technologies.Search in Google Scholar
Can WangTao BoYun Wei ZhaoChi-Hung ChiKwok-Yan LamSen WangMin Shu. (2018). Behavior-interior-aware user preference analysis based on social networks. Complexity, 2018(Pta11).Search in Google Scholar
Urueña López, Alberto, Mateo, F., Navío-Marco, Julio, Martínez-Martínez, José María, Gómez-Sanchís, Juan, & Vila-Francés, Joan, et al. (2019). Analysis of computer user behavior, security incidents and fraud using self-organizing maps. Computers & Security.Search in Google Scholar
Bao, K., & Ding, Y. (2020). Multiobjects association and abnormal behavior detection for massive data analysis in multisensor monitoring network. Mathematical Problems in Engineering, 2020.Search in Google Scholar
Qi, W., Ding, W., Wang, X., Jiang, Y., Xu, Y., & Wang, J., et al. (2018). Construction and mitigation of user-behavior-based covert channels on smartphones. IEEE Transactions on Mobile Computing, PP(1), 1-1.Search in Google Scholar
Yin, L., & Zhong, Q. (2023). Googleresnet3 network for detecting the abnormal electricity consumption behavior of users. International journal of electrical power and energy systems.Search in Google Scholar
Ko, K. E., & Sim, K. B. (2018). Deep convolutional framework for abnormal behavior detection in a smart surveillance system. Engineering Applications of Artificial Intelligence, 67(jan.), 226-234.Search in Google Scholar
Xue, G., Liu, S., & Gong, D. (2020). Identifying abnormal riding behavior in urban rail transit: a survey on “in-out’’ in the same subway station. IEEE Transactions on Intelligent Transportation Systems, PP(99), 1-13.Search in Google Scholar
Khan, M. S., Gul, N., Kim, S. M., Kim, J., & Din, I. (2020). A comparative analysis of different outlier detection techniques in cognitive radio networks with malicious users. Wireless Communications and Mobile Computing, 2020, 18.Search in Google Scholar
Shi, H., Ji, L., Liu, S., Wang, K., & Hu, X. (2022). Collusive anomalies detection based on collaborative markov random field. Intelligent data analysis.Search in Google Scholar
Shuo, J., Hui, F., Shining, L., Zhao, X., & Khattak, A. J. (2019). Lstm-cnn for abnormal driving behavior recognition. IET Intelligent Transport Systems, 14(7).Search in Google Scholar
Essa, M., Hussein, M., & Sayed, T. (2018). Road users’ behavior and safety analysis of pedestrian–bike shared space: case study of robson street in vancouver. Canadian Journal of Civil Engineering, 45(12), 1053-1064.Search in Google Scholar
Lei, Z., Zhi-Kun, C., Jing-Quan, L. I., & Tao, B. (2017). Application of modified k-means model in user behavior analysis of electric power system. Radio Engineering.Search in Google Scholar
Xu, X. X. X. (2018). Abnormal user behaviour perception method in sdn. International Journal of Robotics & Automation, 33(5).Search in Google Scholar
Deng, S., Cai, Q., Zhang, Z., & Wu, X. (2021). User behavior analysis based on stacked autoencoder and clustering in complex power grid environment. IEEE Transactions on Intelligent Transportation Systems, PP(99), 1-15.Search in Google Scholar
Feng, P., Ma, J., & Sun, C. (2017). Selecting critical data flows in android applications for abnormal behavior detection. Mobile Information Systems,2017,(2017-4-30), 2017(pt.3), 1-16.Search in Google Scholar
Wu, C., & Cheng, Z. (2020). A novel detection framework for detecting abnormal human behavior. Mathematical Problems in Engineering, 2020(1), 1-9.Search in Google Scholar
Lin, R., Yang, F., Gao, M., Wu, B., & Zhao, Y. (2019). Aud-mts: an abnormal user detection approach based on power load multi-step clustering with multiple time scales. Energies, 12(16), 3144-.Search in Google Scholar