scispace - formally typeset
Search or ask a question
Author

Reza Hassanzadeh

Bio: Reza Hassanzadeh is an academic researcher from Queensland University of Technology. The author has contributed to research in topics: Anomaly detection & Fuzzy logic. The author has an hindex of 6, co-authored 7 publications receiving 106 citations.

Papers
More filters
Book ChapterDOI
28 Nov 2012
TL;DR: In this article, a framework is proposed for analyzing the effectiveness of various graph theoretic properties such as the number of neighbouring nodes and edges, betweenness centrality, and community cohesiveness in detecting anomalous users.
Abstract: Online social networks can be modelled as graphs; in this paper, we analyze the use of graph metrics for identifying users with anomalous relationships to other users A framework is proposed for analyzing the effectiveness of various graph theoretic properties such as the number of neighbouring nodes and edges, betweenness centrality, and community cohesiveness in detecting anomalous users Experimental results on real-world data collected from online social networks show that the majority of users typically have friends who are friends themselves, whereas anomalous users' graphs typically do not follow this common rule Empirical analysis also shows that the relationship between average betweenness centrality and edges identifies anomalies more accurately than other approaches

39 citations

01 Nov 2012
TL;DR: In this article, a framework is proposed for analyzing the effectiveness of various graph theoretic properties such as the number of neighbouring nodes and edges, betweenness centrality, and community cohesiveness in detecting anomalous users.
Abstract: Online social networks can be modelled as graphs; in this paper, we analyze the use of graph metrics for identifying users with anomalous relationships to other users. A framework is proposed for analyzing the effectiveness of various graph theoretic properties such as the number of neighbouring nodes and edges, betweenness centrality, and community cohesiveness in detecting anomalous users. Experimental results on real-world data collected from online social networks show that the majority of users typically have friends who are friends themselves, whereas anomalous users’ graphs typically do not follow this common rule. Empirical analysis also shows that the relationship between average betweenness centrality and edges identifies anomalies more accurately than other approaches.

34 citations

Proceedings ArticleDOI
04 Nov 2013
TL;DR: In this paper, a rule-based hybrid method using graph theory, fuzzy clustering and fuzzy rules for modeling user relationships inherent in online-social-network and for identifying anomalies is proposed.
Abstract: Detecting anomalies in the online social network is a significant task as it assists in revealing the useful and interesting information about the user behavior on the network. This paper proposes a rule-based hybrid method using graph theory, Fuzzy clustering and Fuzzy rules for modeling user relationships inherent in online-social-network and for identifying anomalies. Fuzzy C-Means clustering is used to cluster the data and Fuzzy inference engine is used to generate rules based on the cluster behavior. The proposed method is able to achieve improved accuracy for identifying anomalies in comparison to existing methods.

16 citations

Dissertation
01 Jan 2014
TL;DR: This research is a step forward in improving the accuracy of detecting anomaly in a data graph representing connectivity between people in an online social network using fuzzy machine learning techniques utilising different types of structural input features.
Abstract: This research is a step forward in improving the accuracy of detecting anomaly in a data graph representing connectivity between people in an online social network. The proposed hybrid methods are based on fuzzy machine learning techniques utilising different types of structural input features. The methods are presented within a multi-layered framework which provides the full requirements needed for finding anomalies in data graphs generated from online social networks, including data modelling and analysis, labelling, and evaluation.

11 citations

Journal Article
TL;DR: A rule-based hybrid method using graph theory, Fuzzy clustering and FBuzzy rules for modeling user relationships inherent in online-social-network and for identifying anomalies is proposed.
Abstract: Detecting anomalies in the online social network is a significant task as it assists in revealing the useful and interesting information about the user behavior on the network. This paper proposes a rule-based hybrid method using graph theory, Fuzzy clustering and Fuzzy rules for modeling user relationships inherent in online-social-network and for identifying anomalies. Fuzzy C-Means clustering is used to cluster the data and Fuzzy inference engine is used to generate rules based on the cluster behavior. The proposed method is able to achieve improved accuracy for identifying anomalies in comparison to existing methods.

10 citations


Cited by
More filters
Journal ArticleDOI
David Savage1, Xiuzhen Zhang1, Xinghuo Yu1, Pauline Chou1, Qingmai Wang1 
TL;DR: In this paper, a survey of existing computational techniques for detecting anomalies in online social networks is presented and an overview of the types of problems that anomaly detection can address and identifies key areas for future research.

203 citations

Journal ArticleDOI
TL;DR: It was found that the mobile based applications have been widely developed in recent years with fast growing deployment by healthcare professionals and patients but despite the advantages of smartphones in patient monitoring, education, and management there are some critical issues and challenges related to security and privacy of data, acceptability, reliability and cost that need to be addressed.
Abstract: Mobile phones are becoming increasingly important in monitoring and delivery of healthcare interventions. They are often considered as pocket computers, due to their advanced computing features, enhanced preferences and diverse capabilities. Their sophisticated sensors and complex software applications make the mobile healthcare (m-health) based applications more feasible and innovative. In a number of scenarios user-friendliness, convenience and effectiveness of these systems have been acknowledged by both patients as well as healthcare providers. M-health technology employs advanced concepts and techniques from multidisciplinary fields of electrical engineering, computer science, biomedical engineering and medicine which benefit the innovations of these fields towards healthcare systems. This paper deals with two important aspects of current mobile phone based sensor applications in healthcare. Firstly, critical review of advanced applications such as; vital sign monitoring, blood glucose monitoring and in-built camera based smartphone sensor applications. Secondly, investigating challenges and critical issues related to the use of smartphones in healthcare including; reliability, efficiency, mobile phone platform variability, cost effectiveness, energy usage, user interface, quality of medical data, and security and privacy. It was found that the mobile based applications have been widely developed in recent years with fast growing deployment by healthcare professionals and patients. However, despite the advantages of smartphones in patient monitoring, education, and management there are some critical issues and challenges related to security and privacy of data, acceptability, reliability and cost that need to be addressed.

171 citations

Journal ArticleDOI
Wei Wang1, Yaoyao Shang1, Yongzhong He1, Yidong Li1, Jiqiang Liu1 
TL;DR: This work proposes BotMark, an automated model that detects botnets with hybrid analysis of flow-based and graph-based network traffic behaviors with superior detection accuracy, and collects a very large size of network traffic by simulating 5 newly propagated botnets in a real computing environment.

134 citations

Journal ArticleDOI
TL;DR: A novel framework is proposed, named NetSpam, which utilizes spam features for modeling review data sets as heterogeneous information networks to map spam detection procedure into a classification problem in such networks.
Abstract: Nowadays, a big part of people rely on available content in social media in their decisions (e.g. reviews and feedback on a topic or product). The possibility that anybody can leave a review provide a golden opportunity for spammers to write spam reviews about products and services for different interests. Identifying these spammers and the spam content is a hot topic of research and although a considerable number of studies have been done recently toward this end, but so far the methodologies put forth still barely detect spam reviews, and none of them show the importance of each extracted feature type. In this study, we propose a novel framework, named NetSpam, which utilizes spam features for modeling review datasets as heterogeneous information networks to map spam detection procedure into a classification problem in such networks. Using the importance of spam features help us to obtain better results in terms of different metrics experimented on real-world review datasets from Yelp and Amazon websites. The results show that NetSpam outperforms the existing methods and among four categories of features; including review-behavioral, user-behavioral, reviewlinguistic, user-linguistic, the first type of features performs better than the other categories.

107 citations