Skip to Content
Applied SciencesApplied Sciences
  • Article
  • Open Access

25 January 2025

User Profile Construction Based on High-Dimensional Features Extracted by Stacking Ensemble Learning

,
,
and
1
School of Automation Science and Electrical Engineering, Beihang University, Beijing 100191, China
2
School of Mechanical Engineering, University of Science and Technology Beijing, Beijing 100083, China
*
Authors to whom correspondence should be addressed.
This article belongs to the Special Issue AI Technology and Security in Cloud/Big Data

Abstract

Online social networks, as platforms for personal expression, have evolved into complex networks integrating political and social dimensions. This evolution has shifted the focus of network governance from addressing hacking activities to mitigating unpredictable social behaviors, such as the malicious manipulation of public opinion, the doxing of ordinary users, and cyberbullying. However, the sparsity of data and the concealed nature of user behavior pose significant challenges to existing network reconnaissance technologies. In this study, we focus on constructing user profiles on online social network platforms by extracting features to build deep user profiles based on behavioral patterns. Drawing inspiration from the 5Cs principle of credit evaluation, we refine it into a 3Cs principle tailored for user profiling on social network platforms and associate it with user behavioral patterns. To further analyze user behavior, a high-dimensional feature extraction method is proposed using an improved stacking ensemble learning model. Based on experimental data analysis, the most suitable base algorithms for high-dimensional feature extraction are identified. Experimental results demonstrate that the integration of high-dimensional features improved the behavior prediction accuracy of the profiling model by 9.26% on balanced datasets and enhanced the AUC (area under the curve) metric by 3.69% on imbalanced datasets. The proposed method effectively increases the depth and generalization performance of user profiling.

1. Introduction

Online social networks (OSNs) have gradually supplanted traditional media as the primary platforms for public information consumption and opinion expression [1,2]. Research indicates that these global information dissemination channels attract widespread participation in policy and news discussions. Their real-time nature and vast user base significantly contribute to the discourse surrounding trending topics and sudden events [3,4].
The proliferation of the internet and the rise of social networks, such as TikTok and Twitter, have not only facilitated the seamless communication, exchange, and dissemination of information but also provided covert means for illegal activities and cybercrimes. Exploiting the anonymity and virtuality of social media platforms, malicious actors employ metaphors, coded language, and other methods to communicate and disseminate information. By manipulating or altering the information carried by these networks, they can directly influence the thoughts of online audiences, thereby shaping their judgments on social events. Furthermore, the anonymity and global reach of these platforms enable perpetrators to engage in unlawful activities across multiple locations while amplifying their influence through the broadcasting features of social media. Fortunately, such behaviors typically exhibit a high degree of correlation and organization [5]. Leveraging technologies such as data mining and artificial intelligence to construct malicious user profiles can offer significant potential for proactive risk mitigation.
User labeling, or user profiling, involves using a set of user attributes or behavioral features to create concise yet representative descriptions based on data and behavior analysis. These attributes may include age, gender, IP address, occupation, education level, interests, and social media activities. Such data can be transformed into actionable intelligence for law enforcement, enabling the identification of high-risk individuals and the early detection of potential criminal activities. For instance, analyzing account registration details alongside data traces from clicks, visits, and bookmarks can directly identify and evaluate anomalous users—one of the most direct applications of user profiling in investigations [6]. Additionally, profiling can uncover behavioral patterns and interaction dynamics within criminal groups, facilitating the identification of other members and potential targets, thereby enabling the control and guidance of group behaviors [7].
In practice, although social media platforms contain valuable data for identifying individuals and predicting criminal tendencies, the sparse and unstructured nature of this data poses significant challenges for effective extraction and classification. The fragmentation and high degree of unstructured data demand sophisticated approaches in data mining and behavioral prediction. Furthermore, although academic research has explored user profiling from various perspectives and to varying degrees, its application in the context of internet communities remains relatively limited. However, the data carried by social network users often do not directly correlate with their risk levels. Instead, the relationship between user characteristics and risk exists in a higher-dimensional vector space. While basic attribute-based profiling captures substantial user information, deeper insights into user behavior and the extraction of high-dimensional features are essential for addressing risks posed by malicious online users.
In this study, we advance research into predicting the “risky behaviors” of users based on profiling. A deep user profiling model based on behavioral patterns is introduced guided by the 3Cs principle, adapted from the credit assessment 5Cs framework. Features are extracted from internet data based on these principles. Subsequently, the dataset is processed to derive the foundational features of user profiles, which are categorized into three attributes: population attributes, tweet attributes, and social attributes. Addressing the challenges of data sparsity and the concealment of anomalous behaviors, an enhanced stacking model is proposed. This model integrates base classifiers for extracting high-dimensional features and a meta-classifier for feature fusion. Through mathematical analysis and experimental evaluation, the performance of various base classifiers is compared, enabling the effective selection of high-dimensional features. By mining users’ in-depth behavioral patterns, we enrich user profile attributes, enhancing both accuracy and generalization. Based on this research, user characteristics are identified, and social network profiles are built by analyzing users’ personal information, online content, and social interactions. This approach helps predict abnormal behaviors on social networks, enhancing the efficiency of monitoring and guiding online communities, intelligence collection and analysis, and social security investigations.
In summary, the contributions of this paper are as follows:
  • It proposes the 3Cs principle for the risk assessment of social network users, categorizing raw datasets into three foundational attributes based on behavioral patterns and constructing OSN user profiles accordingly.
  • It analyzes and compares the strengths and weaknesses of various supervised learning algorithms in extracting high-dimensional attributes, identifying the most suitable classifiers for profiling tasks.
  • It improves traditional stacking methods by integrating diverse machine learning algorithms to extract high-dimensional user attributes, enhancing the accuracy and robustness of user profiles by leveraging basic attribute information.

3. Method

3.1. Basic Attributes for User Profiling

The need to assess users’ credit systems or individual characteristics from multiple perspectives to avoid losses caused by malicious users has gradually evolved into user profiling technology, which is now widely applied across various industries. In the financial market, the 5Cs of credit provide a user profiling framework used by financial institutions and other non-bank lenders to evaluate borrowers’ creditworthiness and overall loan application strength. The 5Cs consist of capacity, character, capital and collateral, and conditions [40]. The 5Cs represent general principles used in traditional credit scoring to solve issues, and as a classic user risk evaluation system, many of its assessment criteria are applicable to the study of risky users on online social networks (OSNs). In the context of profiling malicious users on social network platforms, although highly personal information related to capital and collateral cannot be obtained from publicly accessible social data, the remaining 3Cs—capacity, character, and conditions—can largely be verified through social data. Referring to the traditional 5Cs credit scoring principles, the 3Cs framework for social network user risk assessment can be summarized as follows:
(1)
Capacity:
Low-risk users tend to share content related to their personal life on social networks. Such content often reflects their educational background, stable financial standing, significant online influence, and long, interconnected network chains.
(2)
Character:
Low-risk users typically act as producers rather than mere consumers of social media content. Their language style and content quality indicate traits like caution and responsibility. They demonstrate relatively healthy and consistent online activity patterns, including moderate posting frequency and appropriate post length.
(3)
Conditions:
Low-risk users usually maintain a good physical and mental state, without recent occurrences of unfortunate events such as unemployment or illness. These conditions reduce the likelihood of extreme behavior. While IP addresses cannot directly indicate user risk, malicious users often exhibit clustering or convergence in their IP patterns.
Based on the above principles, we summarize the relevant user attributes and their representative social network features in Table 1. Attributes and features that could potentially fall under two principles are only categorized under one principle.
Table 1. The 3Cs principles and their associated behavioral patterns and representative features.
Based on the potential behavioral patterns related to user profiling and the representative social network features summarized in Table 1 according to the 3Cs principles, we further investigate specific attributes derived from actual OSN platform data and categorize them more systematically. We mainly focus on data collected from Twitter due to its accessibility and consistency with other platforms. Guided by the 3Cs principles, the features collected in the raw dataset are preprocessed through data cleaning, content replacement, short-text data processing, and other operations, resulting in the feature set U_low. U_low contains all fundamental input attributes for the subsequent malicious user profiling prediction model. By analyzing these features, they are categorized into three groups representing potential user behavior patterns: population attributes, tweet attributes, and social attributes (detailed in Table 2).
Table 2. Division of malicious user profile features on OSNs.
Population attributes include basic user characteristics such as username, age, gender, and location. These attributes often influence users’ perspectives on various issues. For instance, usernames can provide significant insights into behavioral styles. Tweet attributes serve as another vital source of information on social networks. Although attributes like “tweet_vec” may not directly correlate with malicious behavior evaluation, temporal data, originality, the use of emojis, and the inclusion of links reveal personal preferences and behavioral tendencies, indirectly reflecting risk-related actions. The most distinctive social attributes arise from users’ profile pages, which offer statistics on network relationships, including followers and followings. Moreover, tweet-associated activities such as likes, retweets, comments, views, and mentions (@friends) also fall under this category. These behaviors underline the core social value of platforms, which lies in the connections established through user interactions like liking, retweeting, and commenting. Together, these social attributes form a unique source of networked information on social media platforms.

3.2. High-Dimensional Feature Extraction Using Stacking Learning

Although basic user attributes provide significant insights, the relationship between social network users’ features and their risk levels is often not directly apparent. Instead, this correlation exists in a higher-dimensional space. To further explore user behaviors and uncover hidden features, the extraction of deep, high-dimensional attributes becomes essential.
To combine the predictions of two or more base machine learning algorithms, an ensemble learning-based approach is employed for the design of feature extractors. Classic ensemble learning structures include bagging, boosting, and stacking. The goal of bagging is to enhance the model’s generalization ability by reducing the variance of the base classifiers. Therefore, the effectiveness of bagging largely depends on the stability of the base classifiers. In the case of boosting, from a mathematical perspective, it can reduce the bias of the results, theoretically enabling it to generate arbitrarily precise classifiers, even with weak base learners. However, this also makes boosting highly sensitive to noise, making it difficult to achieve good training results in datasets that are not conducive to it. Additionally, the serial structure of boosting leads to slower training times. On the other hand, stacking’s training method improves both model variance and bias. While aiming for broad model generalization, it retains the original features, with its meta-classifier used to find the corresponding weights or combinations of the features from the updated training set. If the outputs of the base classifiers are regarded as deep features of the samples, the meta-model can also be described as a multimodal data fusion model with deep information modalities.
After comparing and contrasting the three ensemble learning approaches, we finally select the stacking model as the overall framework for the proposed model. Based on the analysis in Section 3.1, the attributes are categorized into three groups: population attributes, social attributes, and tweet attributes. Each group represents unique dimensions of user behavior, requiring specific analytical approaches. The workflow, illustrated in Figure 1, integrates these groups using a tailored stacking approach.
Figure 1. Workflow of improved stacking ensemble learning.
In this method, base classifiers are trained separately for each attribute group, with only the best-performing classifiers retained. These are then integrated by a meta-classifier, which combines the output of the base classifiers into a single prediction. The ensemble model optimizes overall performance by considering the combined strength of all classifiers rather than relying on individual models. This structured integration ensures that each data type is analyzed effectively while capturing their deeper relationships in high-dimensional space.
To complement the foundational attributes, we introduce high-dimensional attributes in this paper, derived from a combination of the three attribute groups and advanced feature extraction methods. These new attributes, outlined in Table 3, encapsulate user characteristics that may not be evident in low-dimensional features but can be identified through advanced machine learning techniques.
Table 3. High-dimensional attributes of user profiles.
For feature extraction, several supervised learning algorithms are employed, including logistic regression, support vector machines (SVMs), multi-layer perceptrons (MLPs), 1D convolutional neural networks (1D-CNNs), and decision trees. These algorithms process the basic features to generate higher-order representations that can reveal latent patterns linked to user risk. The results of these models will be evaluated in Section 4 to determine their effectiveness in uncovering meaningful high-dimensional attributes. This stacking-based framework effectively bridges the gap between basic user features and complex, high-dimensional patterns, providing a robust foundation for understanding user behavior and predicting risk on social networks.

4. Experiment

4.1. Implementation Details

The dataset used in this study is the publicly available Apontador dataset, which was collected from a location-based professional social network platform. The dataset was manually labeled by Helen Costa et al. [41], with 3538 entries categorized as spam, divided into three classes: local marketer, polluter, and bad-mouther. Local marketer includes ads related to local businesses, where excessive advertisements and promotional content may interfere with users’ normal browsing and some marketing information may contain phishing links or malware, posing security risks to users. Polluter refers to content that is irrelevant or unrelated to a specific location, and the proliferation of such content can lead to topic drift, disrupting the discussion atmosphere within the community. Bad-mouther is characterized by aggressive comments that target a particular place or other users, infringing upon their reputation and privacy and potentially causing psychological harm, thereby threatening social stability. These categories align with the malicious user labels discussed in the previous chapter, making the Apontador dataset suitable for experimental validation in this research. Additionally, 3538 non-spam entries are randomly selected to balance the dataset, resulting in a total of 7076 samples, as summarized in Table 4.
Table 4. Sample distribution of the Apontador dataset.
The dataset contains a significant imbalance, with far fewer malicious users compared to regular users in reality. In order to evaluate the performance of different combinations more realistically, especially under threshold-sensitive evaluation metrics, a balanced dataset is used. On the other hand, to get closer to real life, the imbalanced dataset is used. This dataset reflects the actual distribution of high-risk and regular users. The imbalanced dataset is derived from the Apontador dataset, with 3538 non-spam entries (representing two-thirds) and 1769 spam entries (including 531 local marketing, 858 pollution, and 380 malicious defamation cases, representing one-third). In subsequent studies by Helen Costa et al., features are further categorized into four groups, totaling 60 normalized features. The grouping principles are consistent with those in this study, with slight differences in naming. For simplicity, content attributes and social attributes in the dataset are denoted as CA and SA, respectively, corresponding to the tweet attributes and social attributes in Table 4. User attributes and place attributes are combined into user attributes according to the principles of this paper and are simply referred to as UA, corresponding to the population attributes in Table 4.

4.2. Stacking Base Classifier Performance Analysis

To analyze the effectiveness of the five base classifiers in deriving high-dimensional features, χ 2   Chi - squared , χ 2   p - value , and Pearson and Spearman correlation coefficients are used. These correlation metrics help quantify the strength of the relationships between features and labels, focusing on absolute values. The evaluation is performed on both the balanced and imbalanced datasets, comparing the performance of different attribute features using GBDT as the classifier. The GBDT model utilizes 100 decision trees with a learning rate of 0.1 and a maximum tree depth of 3, and evaluation is based on precision, recall, and F1-score metrics.
The test and correlation analysis results for the high-dimensional features extracted from population attributes are presented in Table 5, with prediction results for spam and non-spam information shown in Table 6. As indicated in Table 5, all the high-dimensional features derived from the user statistics pass the significance tests, confirming that, despite variations in the influence of each feature on the profiling results, they all contribute positively to improving accuracy. The high-dimensional features generated by different base learners are strongly correlated with the sample labels, with decision trees yielding the highest correlation. However, as shown in Table 6, decision tree-derived high-dimensional features exhibit balanced but mediocre prediction results. For non-spam information, the precision metric is of primary concern, while for spam, recall is prioritized. Classifier 2 demonstrates high precision for predicting positive samples, meaning that most of the cases it identified as positive are indeed correct, reducing false positives. Additionally, it shows high recall for predicting negative samples, meaning it successfully captures most of the actual negative samples, reducing false negatives. Therefore, classifier 2 (SVM) is chosen as the base learner for user attribute features in this study.
Table 5. Test results of the high-dimensional features extracted from population attributes.
Table 6. Prediction results of spam and non-spam information when the high-dimensional features of population attributes are input.
The test results and correlation analysis for the high-dimensional features extracted from tweet attributes are shown in Table 7. All the high-dimensional features extracted from tweet attributes pass the significance tests, but different base learners exhibit varied performance. Specifically, 1D-CNN, MLP, and decision trees perform better than Logistic learners in extracting high-dimensional features from tweet attributes, which differs from the results observed for population attributes. In the correlation analysis of the high-dimensional features extracted from tweet attributes, decision trees still achieve the best correlation metrics. However, their correlation coefficients do not differ significantly from those of other base classifiers. The high-dimensional features extracted by MLP show nearly identical Pearson and Spearman correlation coefficients to those extracted by decision trees.
Table 7. Test results of the high-dimensional features extracted from tweet attributes.
The classification results for spam and non-spam information using high-dimensional features from tweet attributes as input are presented in Table 8. MLP achieves the highest precision score (0.824) and recall score (0.823) with marginal differences. The F1 score also indicates that MLP performs more consistently in predicting non-spam information. In terms of balancing false positives and false negatives, MLP demonstrates strong performance. Its high precision reduces the misclassification of positive samples, while its high recall ensures that nearly all negative samples are correctly identified. Consequently, MLP is selected as the base learner for high-dimensional feature extraction from tweet attributes.
Table 8. Prediction results of spam and non-spam information when high-dimensional features of tweet attributes are input.
The test results and correlation analysis for the high-dimensional features extracted from social attributes are shown in Table 9. Similar to the tweet attributes, all the high-dimensional features extracted from social attributes pass the significance tests. However, in terms of correlation with the sample labels, high-dimensional features based on social attributes show a considerable gap compared to those based on tweet and population attributes.
Table 9. Test results of the high-dimensional features extracted from social attributes.
The classification performance for positive and negative samples using the high-dimensional features from social attributes as input is shown in Table 10. The recall for non-spam information reaches relatively ideal levels, with over 90% of positive samples being correctly predicted. However, the detection capability for spam information, which is the focus of this study, is only about 55%. Furthermore, the prediction of spam information exhibits an opposite pattern to that of non-spam information. While the model achieves high precision for spam information, it has low recall. This indicates that the model rarely classifies non-spam information as spam but often misclassifies spam information as non-spam. Such performance leads to the omission of spam information or malicious users. As a result, high-dimensional features based on social attributes are not included as supplementary features for user profiling in this study.
Table 10. Prediction results of spam and non-spam information when high-dimensional features of social attributes are input.
The test results and correlation analysis for the high-dimensional features extracted from all attributes are shown in Table 11. When all attributes are integrated as input, the performance of user profiling significantly improves. The Chi-squared test results for decision trees demonstrate the highest correlation when all attributes are used, as corroborated by the correlation analysis. In Table 11, the high-dimensional features extracted by decision trees show a correlation of over 0.9 with the sample labels.
Table 11. Test results of the high-dimensional features extracted from user attributes.
Table 12 shows the classification results when the high-dimensional features extracted by different classifiers are used as input. The precision for non-spam information exceeds 85% for all classifiers, with Logistic, SVM, and MLP achieving over 90%. Additionally, these three base learners achieve recall values over 90% for spam information, demonstrating their strong capability to support the model when high-dimensional features based on all attributes are used. Therefore, we incorporated the results from Logistic, SVM, and MLP as supplementary features for user profiling.
Table 12. Prediction results of spam and non-spam information when high-dimensional features of user attributes are input.

4.3. Performance Evaluation of User Profiling with Integrated High-Dimensional Features

Based on the analysis in Section 4.2, the final improved user profiling method, which extracts high-dimensional features using stacking-based ensemble learning, is illustrated in Figure 2. The first layer of the stacking model consists of multiple base learners, including logistic regression (Logistic), support vector machines (SVMs), and multi-layer perceptron (MLP), which are used to extract high-dimensional feature representations from different attributes. The high-dimensional features extracted from population attributes are denoted as population_high, those from tweet attributes as tweet_high, and those from all attributes as user_high 1, user_high 2, and user_high 3. These high-dimensional features are then concatenated with the dataset to form a new feature dataset.
Figure 2. High-dimensional feature extraction based on stacking ensemble learning.
To achieve optimal identification performance, a composite neural network model with an attention mechanism is used for training, with its structure shown in Figure 3.
Figure 3. User profile prediction network.
The dataset is divided into training and test sets in an 8:2 ratio to produce the model’s input X = u 1 , , u s 1 , u s T , where u i i = 1,2 , , s represents the feature vector of sample i , and s denotes the number of samples. CNN is used to extract features, with ReLU as the activation function in the convolutional layers and max-pooling applied. The final output O c = o c 1 , , o c s 1 , o c s T , where o c i i = 1,2 , , s represents each sample’s output from the CNN network, is activated using a sigmoid function, following the parameter transmission formula detailed below:
Z = ReLU u W c + b c
P = max Z + b p
o c = s i g m o i d P W o + b o
where Z is the output of the first convolution layer, P is the output of pooling, W c is the weight of the convolution layer, W o is the weight of the output layer, b c is the convolution layer bias, b p is the pooling layer bias, and b o is the output layer bias.
After convolution, LSTM is employed to extract text features. Its output h t is as below:
h t = L S T M o c t 1 , o c t , t 1 , j
where o c t is the value of o c at time t , and j is the length of o c . The output from LSTM is fed into an attention layer, where weights are assigned probabilistically. The attention layer output o t is derived as follows:
e t = u tan h w h t + b
a t = exp e t j = 1 t e j
o t = t = 1 i a t h t
where u and w are weights, b is bias, and e t is probability distribution. The user prediction results Y = y 1 , , y s 1 , y s T are then generated through a sigmoid activation function. The final model’s training results are shown in Figure 4.
Figure 4. Results of user profile on the balanced dataset after adding different high-dimensional features.
Figure 4 presents the training outcomes for models under three scenarios: (1) without high-dimensional features, (2) with basic high-dimensional features (population high and tweet high), and (3) with all high-dimensional features. The test set accuracies achieved are 77.23%, 81.82%, and 86.49%, respectively. Integrating all high-dimensional features yields the highest overall accuracy for the training curve. Although some fluctuations occur, the inclusion of high-dimensional features allows the model to capture more information for effective learning. Using only basic high-dimensional features (population high and tweet high), the initial training curve resembles that of the full-feature model. However, as training progressed, its performance gradually declined and exhibited greater volatility, indicating that relying solely on partial high-dimensional features might be insufficient to sustain model performance throughout training. Without integrating high-dimensional features and using only the raw training inputs, the training curve consistently lagged behind the other two curves, demonstrating that high-dimensional features provide crucial information for accurate profiling predictions.
In summary, integrating multiple high-dimensional attribute features can effectively enhance the performance and stability of user profiling. This finding underscores the importance of considering the depth of profiling and hidden information during the profiling process. However, introducing too many variables could introduce noise, leading to minor oscillations in model training. Therefore, careful consideration of each variable’s contribution to the profiling model is necessary.

4.4. Robustness Analysis

In machine learning and deep learning, robustness refers to a model’s ability to tolerate noise, variability, or inaccuracies in input data while maintaining performance. A robust model effectively handles the complexities of real-world conditions, such as data corruption, operational errors, non-ideal environments, and natural variations in data. Given that the quantity of spam and non-spam information on real-world social networking platforms is often imbalanced, this section evaluates the overall performance of user profiling under such real-world scenarios. The evaluation uses an imbalanced dataset derived from the Apontador dataset, which is further supplemented with high-dimensional features to form a new balanced dataset. To achieve effective identification, the composite neural network model with the attention mechanism designed in Section 4.3 is used, with accuracy serving as the metric to assess the model’s overall training performance. The training results of the model are shown in Figure 5.
Figure 5. Results of the user profile on the imbalanced dataset after adding different high-dimensional features.
Figure 5 sequentially illustrates the training outcomes on the imbalanced dataset under three scenarios: (1) without high-dimensional features, (2) with basic high-dimensional features (population high and tweet high), and (3) with all high-dimensional features. Table 13 provides a comparative analysis of the profiling performance under different inputs.
Table 13. Comparison of user profile prediction performance with different inputs on the imbalanced dataset.
  • When all high-dimensional features are integrated, the training curve fluctuates at a high level, indicating that the profiling model performs well even when incorporating all potential high-dimensional features as input.
  • When only basic high-dimensional features are added, the curve closely follows the blue curve (all features) with similar fluctuations. The profiling model’s performance remains relatively good in this case, but it may lose some information, leading to a slight decline in performance.
  • Without high-dimensional features, the model performs the worst.
Table 13 compares the profiling prediction performance under different inputs on the imbalanced dataset. Combining the observations from Figure 4 and Figure 5, it can be seen that although the inclusion of high-dimensional features improves profiling accuracy to some extent, the improvement is quite limited on imbalanced datasets. Additionally, during training on the imbalanced dataset, the model’s performance exhibits significantly increased fluctuations. This could be due to sample instability or the excessive number of inputs to the model. To address these issues, it is necessary to explore alternative methods for feature fusion or training that amplify the contributions of modal-specific attribute features while minimizing the introduction of noise.

5. Conclusions

Based on the classic 5Cs model of credit assessment, we construct the 3Cs user profiling principles specifically for OSN platforms and successfully associate them with user behavior patterns in this paper. This theoretical innovation expands user profiling from text-based and statistical features to three more specific dimensions: population attributes, tweet attributes, and social attributes. Addressing the limitations of traditional user profiles in handling the data sparsity and behavioral concealment issues of online social network platforms, a high-dimensional attribute feature extraction method for user profiling based on classic stacking ensemble learning is proposed. We then compare user high-dimensional attribute features extracted using logistic regression, SVM, MLP, 1D-CNN, and decision trees. Mathematical analyses are performed, and accuracy, recall, and F1 scores are used as evaluation metrics to identify the most suitable stacking base classifiers for various attribute features. Finally, the performance of user profiles integrating high-dimensional features is experimentally validated on both balanced and imbalanced datasets. The results demonstrate that compared to user profiling methods using only basic attributes, the proposed method incorporating high-dimensional attributes extracted via stacking learning achieves a 9.26% improvement in malicious user prediction accuracy on the balanced dataset. On the imbalanced dataset, the method also achieves a 1.5% improvement in accuracy.
Despite these advancements, challenges remain in handling imbalanced datasets, particularly regarding training stability. Increased fluctuations observed during training suggest that excessive input features may introduce noise. We believe that noise in model training can be reduced by introducing multimodal feature fusion methods. By adding a feature fusion layer to the meta-learner of the proposed stacking model, the various input features can be better unified, maximizing the contribution of meaningful features while minimizing noise. On the other hand, when faced with extremely small sample training, the model is likely to experience overfitting. Therefore, future research could consider using cross-validation or batch training methods to prevent overfitting. Additionally, exploring alternative training methods tailored to imbalanced data scenarios could further enhance the robustness and applicability of the proposed user analysis framework in real-world environments.

Author Contributions

Methodology, Z.W.; project administration, K.H.; software, Z.W.; supervision, L.L. and K.H.; validation, Z.W.; writing—original draft, Z.Z.; writing—review and editing, K.H. and Z.Z. All authors will be updated at each stage of manuscript processing, including submission, revision, and revision reminder, via emails from our system or the assigned assistant editor. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Key Research and Development Program of China, grant number No. 2022QY1403.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author. The data are not publicly available due to ongoing research and analysis.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Contri, M.; Fissi, S.; Gori, E. Citizen engagement and dialogic accounting through social media: A study of Italian regions. Accounting. Audit. Account. 2023, 37, 866–892. [Google Scholar] [CrossRef]
  2. Stone, J.A.; Flanders, K.J.; Robles, P.; Can, S.H. Strategic measurement and evaluation of municipal social media: Insight from front-line personnel in the United States. Transform. Gov. People Process Policy 2023, 18, 103–117. [Google Scholar] [CrossRef]
  3. Ordóñez, A.G.; Cañada, F.J.A.; Lasso, E.; Sánchez-Torres, J.A.; Escobar-Sierra, M. Analytical model to measure the effectiveness of content marketing on Twitter: The case of governorates in Colombia. J. Mark. Anal. 2023, 12, 962–978. [Google Scholar] [CrossRef]
  4. Bonsón, E.; Perea, D.; Bednárová, M. Twitter as a tool for citizen engagement: An empirical study of the andalusian municipalities. Gov. Inf. Q. 2019, 36, 480–489. [Google Scholar] [CrossRef]
  5. Lincy, N.L.; Midhunchakkaravarthy. The investigation of network security, including penetrating threats and potential security measures. In Advances in Intelligent Systems and Computing; Springer: Singapore, 2022; pp. 107–117. [Google Scholar]
  6. Shang, P. Artificial Intelligence and Criminal Investigation: Historical changes, technical classifications, and future prospects. J. People’s Public Secur. Univ. China (Soc. Sci. Ed.) 2020, 36, 46–54. (In Chinese) [Google Scholar]
  7. Roy, K.P.; Tripathy, K.A. Cybercrime in Social Media: Theory and Solutions; Chapman and Hall/CRC: New York, NY, USA, 2023; p. 276. [Google Scholar]
  8. Anjum; Katarya, R. Hate speech; toxicity detection in online social media: A recent survey of state of the art and opportunities. Int. J. Inf. Secur. 2023, 23, 577–608. [Google Scholar] [CrossRef]
  9. Yiouli, K.; Demestichas, P.; Adamopoulou, E.; Demestichas, K.P.; Theologou, M.; Paradia, M. User Profile Modeling in the context of web-based learning management systems. J. Netw. Comput. Appl. 2008, 31, 603–627. [Google Scholar]
  10. Bui, T.-H. Estimating bounding box for point of interest using social media geo-tagged photos. IEEE Access 2023, 11, 7387–7849. [Google Scholar] [CrossRef]
  11. Yang, X.; Gao, J.; Zheng, X.; Fang, M.; Tang, L.; Zhang, X. Point-of-interest detection from Weibo data for map updating. Trans. GIS 2022, 26, 2716–2738. [Google Scholar] [CrossRef]
  12. Chew, R.; Kery, C.; Baum, L.; Bukowski, T.; Kim, A.; Navarro, M. Predicting age groups of reddit users based on posting behavior and metadata: Classification model development and validation. JMIR Public Health Surveill 2021, 7, e25807. [Google Scholar] [CrossRef]
  13. Emad, E.A.; Jamil, R.A.; Muath, A. Age and gender prediction in open domain text. Procedia Comput. Sci. 2020, 170, 563–570. [Google Scholar]
  14. Tsao, S.; MacLean, A.; Chen, H.; Li, L.; Yang, Y.; Butt, Z.A. Public attitudes during the second lockdown: Sentiment and topic analyses using Tweets from Ontario, Canada. Int. J. Public Health 2022, 67, 82. [Google Scholar] [CrossRef] [PubMed]
  15. Alejandro, H.H.; Mónica, D.R.T.; Esteban, R.S.; Lorenzo, C.; Lencinas, M.V.; Pastur, G.M. Social media reveal visitors’ interest in flora and fauna species of a forest region. Ecosyst. People 2023, 19, 2155248. [Google Scholar]
  16. Alsaqer, M.; Alelyani, S.; Mohana, M.; Alreemy, K.; Alqahtani, A. Predicting location of Tweets using machine learning approaches. Appl. Sci. 2023, 13, 3025. [Google Scholar] [CrossRef]
  17. Roberto, S.; Ludovico, B.; Salvatore, C. Semantic coherence-based user profile modeling in the recommender systems context. In International Conference on Knowledge Discovery and Information Retrieval; SciTePress: Setúbal, Portugal, 2014; Volume 2, pp. 154–161. [Google Scholar]
  18. Roy, P.K.; Chahar, S. Fake profile detection on social networking websites: A comprehensive review. IEEE Trans. Artif. Intell. 2020, 13, 271–285. [Google Scholar] [CrossRef]
  19. Zhaoyang, W.; Li, L.; Ketai, H. Deep User Profile Construction and Behavior Prediction Based on Multimodal Heterogeneous Feature Fusion. In Proceedings of the 2024 IEEE 19th Conference on Industrial Electronics and Applications (ICIEA), Kristiansand, Norway, 5–8 August 2024; pp. 1–6. [Google Scholar]
  20. Samuel, J.; Ali, G.; Rahman, M.M.; Esawi, E.; Samuel, Y. COVID-19 public sentiment insights and machine learning for tweets classification. Information 2020, 11, 314. [Google Scholar] [CrossRef]
  21. Garcia, K.; Berton, L. Topic detection and sentiment analysis in Twitter content related to COVID-19 from Brazil and the USA. Appllied Soft Comput. 2021, 101, 107057. [Google Scholar] [CrossRef]
  22. Boon-Itt, S.; Skunkan, Y. Public perception of the COVID-19 pandemic on Twitter: Sentiment analysis and topic modeling study. JMIR Public Health Surveill 2021, 6, e21978. [Google Scholar] [CrossRef]
  23. Naseem, U.; Razzak, I.; Khushi, M.; Eklund, P.W.; Kim, J. COVIDSenti: A large-scale benchmark Twitter data set for COVID-19 sentiment analysis. IEEE Trans. Comput. Soc. Syst. 2021, 8, 1003–1015. [Google Scholar] [CrossRef]
  24. Tao, W.; Peng, Y. Differentiation and unity: A cross-platform comparison analysis of online posts’ semantics of the Russian–Ukrainian war based on Weibo and Twitter. Commun. Public 2023, 8, 105–124. [Google Scholar] [CrossRef]
  25. Ma, M.; Gao, Q.; Xiao, Z.; Hou, X.; Hu, B.; Jia, L.; Song, W. Analysis of public emotion on flood disasters in southern China in 2020 based on social media data. Nat. Hazards 2023, 118, 1013–1033. [Google Scholar] [CrossRef]
  26. Zhang, Y.; Ji, T. Youth are united online to fight against involution: A study of group cohesion on Weibo. Front. Psychol. 2023, 18, 1014331. [Google Scholar] [CrossRef] [PubMed]
  27. Li, Q.; Zuo, Z.; Zhang, Y.; Wang, X. Exploring sentiment divergence on migrant workers through the lens of Sina Weibo. Internet Res. 2023, 33, 1331–1371. [Google Scholar] [CrossRef]
  28. Kanaparthi, S.D.; Patle, A.; Naik, K.J. Prediction and detection of emotional tone in online social media mental disorder groups using regression and recurrent neural networks. Multimed. Tools Appl. 2023, 82, 43819–43839. [Google Scholar] [CrossRef]
  29. Ni, W.; Du, Y.; Ma, X.; Lv, H. Research on Hybrid Recommendation Model for Personalized Recommendation Scenarios. Appl. Sci. 2023, 13, 7903. [Google Scholar] [CrossRef]
  30. Mubarak, H.; Abdaljalil, S.; Nassar, A.; Alam, F. Detecting and identifying the reasons for deleted tweets before they are posted. Front. Artif. Intell. 2023, 6, 1219767. [Google Scholar] [CrossRef]
  31. Tufchi, S.; Yadav, A.; Ahmed, T. A comprehensive survey of multimodal fake news detection techniques: Advances, challenges, and opportunities. Int. J. Multimed. Inf. Retr. 2023, 12, 28. [Google Scholar] [CrossRef]
  32. Su, X.; Xiao, L.; Li, W.; Liu, X.; Li, K.-C.; Liang, W. DroidPortrait: Android Malware Portrait Construction Based on Multidimensional Behavior Analysis. Appl. Sci. 2020, 10, 3978. [Google Scholar] [CrossRef]
  33. Alarfaj, F.K.; Ahmad, H.; Khan, H.U.; Alomair, A.M.; Almusallam, N.; Ahmed, M. Twitter bot detection using diverse content features and applying machine learning algorithms. Sustainability 2023, 15, 6662. [Google Scholar] [CrossRef]
  34. Xuejian, H.; Gen-sheng, W.; Luo, Y.; Min, L.; Wu, X.-F.; Li, Z.-P. Weibo Rumors Real-time Detection Model Based on Fusion of Multi User Features and Content Features. J. Chin. Comput. Syst. 2021, 43, 1–12. (In Chinese) [Google Scholar]
  35. Ghosh, S.; Reilly, D.L. Credit card fraud detection with a neural-network. In Proceedings of the 27th Hawaii International Conference on System Sciences, Wailea, HI, USA, 4–7 January 1994; pp. 621–630. [Google Scholar]
  36. Rongrong, C.; Guohua, Z.; Zhihua, L. Research on credit card transaction fraud prediction based on XGBoost algorithm model. Appl. Res. Comput. 2020, 37, 111–112, 115. (In Chinese) [Google Scholar]
  37. Donat, B.S.; Onat, K.O. The roles of value preferences and cognitive emotion regulation strategies on prediction of dating violence. Int. J. Psychol. Educ. Stud. 2020, 7, 96–107. [Google Scholar] [CrossRef]
  38. Dinesh, M.; Azath, M.; Bayapa, R.N.; Ramakrishnan, J.; John, R.; Ravishankar, N.; Karthika, P. Deep convolutional neural network based real-time abnormal behavior detection in social networks. Comput. Electr. Eng. 2023, 111, 108987. [Google Scholar]
  39. Xu, Y.; Zhang, P.; Yu, H.; Zhang, F. Detecting group shilling attacks in recommender systems based on user multi-dimensional features and collusive behaviour analysis. Comput. J. 2023, 67, 604–616. [Google Scholar] [CrossRef]
  40. Rosenberg, E.; Gleit, A. Quantitative methods in credit management: A survey. Oper. Res. 1994, 42, 589613. [Google Scholar] [CrossRef]
  41. Costa, H.; Merschmann, L.H.; Barth, F.; Benevenuto, F. Pollution, bad-mouthing, and local marketing: The underground of location-based social networks. Inf. Sci. 2014, 279, 123–137. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.