伪基站行为模式、时空活动规律可视分析及打击伪基站的解决方案可视化设计: 数据可视分析挑战赛-挑战 1

Translated title of the contribution: Visual analysis of pseudo base station behavior patterns, spatial-temporal activity laws and visual design of solutions to combat pseudo base stations: ChinaVis Data Challenge 2017 - mini challenge 1

Jiawan Zhang, Fujia Yu, Peiwen Lin, Weiting Hou

Research output: Other conference contributionScientific

2 Downloads (Pure)

Abstract

Based on the sample data of spam SMS accumulated by the mobile phone guard application software launched by QHNet, the spam SMS sending and receiving time, MD5, longitude and latitude information are used to analyze the spatial-temporal activity law of the pseudo base station, and the behavior of the pseudo base station is fitted and displayed in the form of a map. On this basis, the spam text messages are classified according to the type of text messages and the degree of economic harm to individuals, and the characteristics of the category data are displayed in a nested ring diagram, and the time and space of the pseudo base stations that send different types of spam text messages are displayed in the form of a conceptual map. Finally, a visual solution is given according to the behavior pattern of the pseudo base station.
Translated title of the contributionVisual analysis of pseudo base station behavior patterns, spatial-temporal activity laws and visual design of solutions to combat pseudo base stations: ChinaVis Data Challenge 2017 - mini challenge 1
Original languageChinese (Simplified)
Publication statusPublished - Jul 2017
Externally publishedYes
Publication typeNot Eligible
Event2017 The 4th China Visualization and Visual Analysis Conference: Data Visual Analysis Challenge-mini challenge 1 - Huanghai Hotel, Qingdao, Shandong Province, China
Duration: 16 Jul 201719 Jul 2017
https://chinavis.org/2017/challenge.html

Conference

Conference2017 The 4th China Visualization and Visual Analysis Conference
Abbreviated titleChinaVis 2017
Country/TerritoryChina
CityQingdao, Shandong Province
Period16/07/1719/07/17
Internet address

Fingerprint

Dive into the research topics of 'Visual analysis of pseudo base station behavior patterns, spatial-temporal activity laws and visual design of solutions to combat pseudo base stations: ChinaVis Data Challenge 2017 - mini challenge 1'. Together they form a unique fingerprint.

Cite this