浏览全部资源
扫码关注微信
1. 东信北邮信息技术有限公司,北京 100191
2. 美国特尔菲学校,美国 俄勒冈州 谢里登 97378
[ "王彦青,男,东信北邮信息技术有限公司数据分析师,主要从事算法研究方面的工作。" ]
[ "王瀚辰,男,现就职于东信北邮信息技术有限公司。" ]
网络出版日期:2017-07,
纸质出版日期:2017-07-20
移动端阅览
王彦青, 王瀚辰. 一种识别骚扰电话的组合算法研究[J]. 电信科学, 2017,33(7):112-119.
Yanqing WANG, Hanchen WANG. Research on a combining algorithm for harassing calls to identify[J]. Telecommunications science, 2017, 33(7): 112-119.
王彦青, 王瀚辰. 一种识别骚扰电话的组合算法研究[J]. 电信科学, 2017,33(7):112-119. DOI: 10.11959/j.issn.1000−0801.2017127.
Yanqing WANG, Hanchen WANG. Research on a combining algorithm for harassing calls to identify[J]. Telecommunications science, 2017, 33(7): 112-119. DOI: 10.11959/j.issn.1000−0801.2017127.
当前骚扰电话层出不穷,严重影响了人们的日常生活。为了有效防范此类电话带来的不良社会影响,采用了数据挖掘的分析手段,深入研究了骚扰电话呼叫特点,提出了一种基于用户反馈的分时段分析骚扰电话识别方法;并对用户标识的疑似骚扰号码引入随机森林算法,极大提高骚扰源识别率,结合布控拦截机制,整体实现对骚扰电话全方位的管控。通过实际数据验证,效果明显。
At present
people’s daily life has been seriously affected by an endless stream of harassing calls.To prevent the adverse social influence
a harassing calls recognition method based on the analysis of users’ feedbacks was proposed
which could make people look insight into the features of harassing calls by data mining.Also
the random forest algorithm was applied to identify the suspected harassment numbers.In this way
the recognition rate of harassment source has been enhanced greatly
and a comprehensive control in harassing calls can be achieved by integrating the portable interceptor.Simulation results also show its good performance.
杜磊 . 骚扰电话何时休 [J ] . 计算机与网络 , 2015 , 41 ( 3 ):1.
DU L . Harassing phone calls [J ] . Computer and Network , 2015 , 41 ( 3 ):1.
漆晨曦 . 立足小数据基础的电信企业大数据分析应用发展策略 [J ] . 电信科学 , 2014 , 30 ( 10 ): 15 - 20 .
QI C X . Analysis and application development strategy of tele-com enterprise big data based on small data [J ] . Telecommuni-cations Science , 2014 , 30 ( 10 ): 15 - 20 .
董师师 , 黄哲学 . 随机森林理论浅析 [J ] . 集成技术 , 2013 ( 1 ): 1 - 7 .
DONG S S , HUANG Z X . A brief theoretical overview of random forests [J ] . Journal of Integration Technology , 2013 ( 1 ): 1 - 7 .
黄勇军 , 冯明 , 丁圣勇 , 等 . 电信运营商大数据发展策略探讨 [J ] . 电信科学 , 2013 , 29 ( 3 ): 6 - 11 .
HUANG Y J , FENG M , DING S Y , et al . Discussion on the de-volpment strategy of telecom operators [J ] . Telecommunications Science , 2013 , 29 ( 3 ): 6 - 11 .
卢卫 , 陆希玉 . 4G时代移动互联网的发展趋势 [J ] . 电信科学 , 2014 , 30 ( 5 ): 51 - 54 .
LU W , LU X Y . Mobile internet trends in 4G era [J ] . Telecom-munications Science , 2014 , 30 ( 5 ): 51 - 54 .
张艳芳 , 黄群 . 基于Bootstrap方法的样本相等性检验 [J ] . 防灾科学学院学报 , 2008 , 10 ( 1 ): 95 - 98 .
ZHANG Y F , HUANG Q . Tests based on bootstrap method for the equality of distribution [J ] . Journal of Institute of Disaster-preven-tion Science and Technology , 2008 , 10 ( 1 ): 95 - 98 .
杜海涛 , 张峰 , 高曼颖 , 等 . 基于话音识别的骚扰电话呼叫检测技术分析 [J ] . 电信工程技术与标准化 , 2014 ( 12 ): 5 - 9 .
DU H T , ZHANG F , GAO M Y , et al . Analysis and experi-ment of disturbing call detection technology based on speech recognition [J ] . Telecom Engineering Technics and Standardization , 2014 ( 12 ): 5 - 9 .
胡坤 , 刘镝 , 刘明辉 , 等 . 大数据的安全理解及应对策略研究 [J ] . 电信科学 , 2014 , 30 ( 2 ): 112 - 117 ,122.
HU K , LIU D , LIU M H , et al . Research on security connotation and response strategies for big data [J ] . Telecommunications Science , 2014 , 30 ( 2 ): 112 - 117 ,122.
0
浏览量
1
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构