Big Data 8 min read

Sequence Pattern Mining for User Behavior Analysis in Xianyu

By applying sequence pattern mining and unsupervised clustering to Xianyu’s massive event logs, the study abstracts high‑level user behaviors, discovers frequent subsequences, uncovers unknown fraudulent account patterns, expands known fraud cohorts with 99 % precision, and enables richer analyses such as PCA‑based cross‑group comparisons.

Xianyu Technology
Xianyu Technology
Xianyu Technology
Sequence Pattern Mining for User Behavior Analysis in Xianyu

Background: User behavior analysis extracts actionable insights from product event data to guide design and operations.

Typical pipeline: data collection → cleaning → presentation. Xianyu’s massive raw event logs suffer from low utilization and low‑level granularity.

We abstract higher‑level behaviors using sequence pattern mining, which finds frequent subsequences in large event sequences.

Example pattern: event2 → event4 → event7 appears across many users, indicating a common behavior.

Combining unsupervised clustering with sequence mining reveals characteristic patterns of user groups.

Case 1 – Detecting unknown fraudulent accounts: a cluster showed the pattern “search results → open product → chat → send file → back to results…”, all files were ad videos, uncovering a new black‑industry cohort.

Case 2 – Expanding a known fraud cohort: using the pattern “search → click → chat → send message → view profile → follow” we identified 57 % more accounts with 99 % precision.

The mined behavior sequences also provide a “user‑behavior count” view for further analysis such as PCA filtering and cross‑group comparisons, illustrating the broader potential of sequence pattern mining.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

Big Dataclusteringdata miningfraud detectionsequence mininguser behavior
Xianyu Technology
Written by

Xianyu Technology

Official account of the Xianyu technology team

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.