Uncovering Suspicious Activity From Partially Paired and Incomplete Multimodal Data

被引:16
作者
Chiu, Carter [1 ]
Zhan, Justin [1 ]
Zhan, Felix [1 ]
机构
[1] Univ Nevada Las Vegas, Dept Comp Sci & Technol, Las Vegas, NV 89154 USA
关键词
Suspicious activity; multimodal data; partially paired data; incomplete data;
D O I
10.1109/ACCESS.2017.2726078
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multimodal data can be used to gain additional perspective on a phenomenon. For applications, such as security and the detection of suspicious activity, the need to aggregate and analyze data from multiple modes is vital. Recent research in suspicious behavior detection has introduced methods for identifying and scoring dense blocks in multivariate tensors, which are consistent indicators of suspicious activity. None yet, however, have proposed a method for the merging and analysis of multiple modes of data for suspicious behavior, especially when the set of items described in each data set do not match-that is, the data is partially paired-which is common when data sets originate from different sources. Neither has a method been described for dealing with the similar case of incomplete data. This paper introduces a technique for multimodal data analysis for suspicious activity detection when the data are only partially paired and/or incomplete. The method is applied to synthetic and real data, demonstrating strong precision and recall even in poorly paired cases.
引用
收藏
页码:13689 / 13698
页数:10
相关论文
共 30 条
[1]   Provenance for Collaboration: Detecting Suspicious Behaviors and Assessing Trust in Information [J].
Allen, M. David ;
Chapman, Adriane ;
Seligman, Len ;
Blaustein, Barbara .
PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM), 2011, :342-351
[2]  
Beutel A., 2013, P 22 INT C WORLD WID, P119, DOI DOI 10.1145/2488388.2488400
[3]  
Chen C, 2015, IEEE IMAGE PROC, P168, DOI 10.1109/ICIP.2015.7350781
[4]   Dense Subgraph Extraction with Application to Community Detection [J].
Chen, Jie ;
Saad, Yousef .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2012, 24 (07) :1216-1230
[5]   Tensor Decompositions for Signal Processing Applications [J].
Cichocki, Andrzej ;
Mandic, Danilo P. ;
Anh Huy Phan ;
Caiafa, Cesar F. ;
Zhou, Guoxu ;
Zhao, Qibin ;
De Lathauwer, Lieven .
IEEE SIGNAL PROCESSING MAGAZINE, 2015, 32 (02) :145-163
[6]   Distributed data mining in peer-to-peer networks [J].
Datta, Souptik ;
Bhaduri, Kanishka ;
Giannella, Chris ;
Kargupta, Hillol ;
Wolff, Ran .
IEEE INTERNET COMPUTING, 2006, 10 (04) :18-26
[7]  
Enache A, 2014, P 2014 IEEE INT C AU, P1
[8]  
Eshraqi N, 2015, SECOND INTERNATIONAL CONGRESS ON TECHNOLOGY, COMMUNICATION AND KNOWLEDGE (ICTCK 2015), P347, DOI 10.1109/ICTCK.2015.7582694
[9]  
Guo B., 2015, STAT METHODS MED RES, V26, P1323
[10]   Social Spammer Detection with Sentiment Information [J].
Hu, Xia ;
Tang, Jiliang ;
Gao, Huiji ;
Liu, Huan .
2014 IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2014, :180-189