A two-level stacking model for detecting abnormal users in Wechat activities

Jiayuan Ling, Gangmin Li

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

2 Citations (Scopus)

Abstract

Machine learning algorithms are widely employed in plenty of classification or regression problems. While in real business world, it is confronted with huge and disorder data pattern. To recognize different kinds of users on the internet accurately and fast becomes a challenge. In a Wechat online bargain activity, the staff found that some strange users are highly like robots or malicious users. Thus we tried a two-level stacking model to detect them. This design got a good result of 0.98 accuracy after the training phase and an accuracy of 0.90 in a new term of the testing set. Moreover, this model is adaptable to linear and nonlinear datasets because of its diverse stacking of first-level classifiers. Therefore, this paper indicates a potential of the stacking classification model in big data times.

Original languageEnglish
Title of host publicationProceedings - 2019 International Conference on Information Technology and Computer Application, ITCA 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages229-232
Number of pages4
ISBN (Electronic)9781728164946
DOIs
Publication statusPublished - Dec 2019
Event2019 International Conference on Information Technology and Computer Application, ITCA 2019 - Guangzhou, China
Duration: 20 Dec 201922 Dec 2019

Publication series

NameProceedings - 2019 International Conference on Information Technology and Computer Application, ITCA 2019

Conference

Conference2019 International Conference on Information Technology and Computer Application, ITCA 2019
Country/TerritoryChina
CityGuangzhou
Period20/12/1922/12/19

Keywords

  • Stacking model
  • Wechat bargain activity
  • classification
  • gray market
  • robot user
  • user behavior

Fingerprint

Dive into the research topics of 'A two-level stacking model for detecting abnormal users in Wechat activities'. Together they form a unique fingerprint.

Cite this