A topic network model to detect criminals without prior information

被引:0
|
作者
Fan, Changjun [1 ]
Xiu, Baoxin [1 ]
Zeng, Li [1 ]
Lv, Guodong [1 ]
Chen, Qing [1 ]
Yu, Lianfei [1 ]
机构
[1] Science and Technology on Information Systems Engineering Laboratory, National University of Defense Technology, Changsha, China
关键词
Cluster analysis - Fuzzy clustering - Clustering algorithms - Iterative methods;
D O I
10.1166/jctn.2015.4247
中图分类号
学科分类号
摘要
Crime analysis has been widely studied, but problem of identifying conspirators through topic network is still not well resolved. In this paper, we proposed a fuzzy clustering algorithm and a hard clustering method to detect criminals hidden in their talks, and both two algorithms took no use of individuals' prior identity information. Firstly, we built up an iterative formula to compute each node's local suspicion, and then we employed the fuzzy c-means (FCM) clustering algorithm and a new hard clustering method with noise (HCN) recently published in Science to get nodes' global suspicions, of which the values are used for conspirator identification. Experiments on a company's email dataset showed both algorithms obtained good identification results: known suspects gained relative higher values in FCM and were all assigned to the criminal cluster in HCN, known innocents got relative lower values in FCM and were all assigned to the innocent group in HCN. We also found these two algorithms were in good agreements, specifically, the HCN results helped determine the discrimination line of the FCM results and the FCM results could quantify the suspicion of each individual assigned in the criminal group of HCN. Copyright © 2015 American Scientific Publishers.
引用
收藏
页码:3615 / 3624
相关论文
共 50 条
  • [41] Topic model for analyzing purchase data with price information
    Iwata, Tomoharu
    Sawada, Hiroshi
    DATA MINING AND KNOWLEDGE DISCOVERY, 2013, 26 (03) : 559 - 573
  • [42] Topic information collection based on Hidden Markov Model
    Jiang, Hai-Yan
    Wang, Xing-Ce
    Wu, Zhong-Ke
    Zhou, Ming-Quan
    Wang, Xue-Song
    Journal of Networks, 2013, 8 (02) : 485 - 492
  • [43] MetaLDA: a Topic Model that Efficiently Incorporates Meta information
    Zhao, He
    Du, Lan
    Buntine, Wray
    Liu, Gang
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2017, : 635 - 644
  • [44] A Novel Framework to Detect Irrelevant Software Requirements Based on MultiPhiLDA as the Topic Model
    Siahaan, Daniel
    Darnoto, Brian Rizqi Paradisiaca
    INFORMATICS-BASEL, 2022, 9 (04):
  • [45] Anomaly detection in information streams without prior domain knowledge
    Beigi, M. S.
    Chang, S. -F.
    Ebadollahi, S.
    Verma, D. C.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2011, 55 (05)
  • [46] Track Initiation for Maritime Radar Tracking with and without Prior Information
    Wilthil, Erik F.
    Brekke, Edmund
    Asplin, Oskar B.
    2018 21ST INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION), 2018, : 472 - 479
  • [47] Low Latency Big Data Processing without Prior Information
    Hu, Zhiming
    Li, Baochun
    Qin, Zheng
    Goh, Rick Siow Mong
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (04) : 1521 - 1534
  • [48] Iterative CBCT Scatter Shading Correction Without Prior Information
    Bai, Y.
    Wu, P.
    Mao, T.
    Gong, S.
    Wang, J.
    Sheng, K.
    Xie, Y.
    Niu, T.
    MEDICAL PHYSICS, 2016, 43 (06) : 3345 - 3345
  • [49] A Hybrid Variable-Resolution GI without Prior Information
    Han, Bin
    Zhou, Dong
    Shi, Moudan
    Cao, Jie
    Hao, Qun
    ELECTRONICS, 2024, 13 (03)
  • [50] Identification of IIR nonlinear systems without prior structural information
    Bai, Er-Wei
    Tempo, Roberto
    Liu, Yun
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2007, 52 (03) : 442 - 453