Abstract
Link prediction techniques are being increasingly employed to detect covert networks, such as terrorist networks. The challenging problem we have been facing is to improve the performance and accuracy of link prediction methods. We develop an algorithm based on Sequential Bayesian Updating method that combines probabilistic reasoning techniques. This algorithm adopts a recursive way to estimate the statistical confidence of the results a prior and then regenerate observed graphs to make inferences. This novel idea can be efficiently adapt to small datasets in link prediction problems of various engineering applications and science researches. Our experiment with a terrorist network shows significant improvement in terms of prediction accuracy measured by mean average precision. This algorithm has also been integrated into an emergency decision support system (NBCDSS) to provide decision-makers’ auxiliary information.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rhodes CJ, Keefe EMJ (2007) Social network topology: a bayesian approach. J Oper Res Soc 58:1605–1611
Greengrass E (2000) Information retrieval: a survey. University of Maryland, Baltimore
Lu L, Medo M, Yeung CH et al (2012) Recommender systems, Phys Rep 519(1):1–49
Jansen R et al (2003) A Bayesian networks approach for predicting protein–protein interactions from genomic data. Science 302:449–453
Yu H et al (2008) High-quality binary protein interaction map of the yeast interactome network. Science 322:104–110
Xiang E (2008) A survey on link prediction models for social network data. PhD thesis, Hong Kong UST, Department of Computer Science and Engineering
Resnik P (1995b) Using information content to evaluate semantic similarity in a taxonomy. In: Proceedings of IJCAI-95. Montreal, Canada pp 448–453
Frakes WB, Baeza-Yates R (1992) Information retrieval: data structures and algorithms. Prentice Hall, US
Hindle D (1990) Noun classification from predicate argument structures. In: Proceedings of the 28th annual meeting of the association for computational linguistics, pp 268–275
Jin EM, Girvan M, Newman MEJ (2001) The structure of growing social networks. Phys Rev Lett E 64:046132
Salton G, McGill MJ (1983) Introduction to modern information retrieval. McGraw-Hill, Maidenherd
Adamic LA, Adar E (2003) Friends and neighbors on the web. Soc Netw 25(3):211–230, July 2003
Mitzenmacher M (2001) A brief history of log normal and power law distributions. In: Proceedings of the Allerton conference on communication, control, and computing, pp 182–191
Rhodes CJ (2009) Inference approaches to constructing covert social network topologies. In: Memon N, Farley JD, Hicks DL, Rosenoorn T (eds) Mathematical methods in counter-terrorism. Springer, Berlin
Xu Z, Tresp V, Yu K, Yu S, Kriegel H-P (2005) Dirichlet enhanced relational learning. In: Proceedings of the 22nd international conference on machine learning. Bonn, Germany, p 1004
Yu K, Chu W, Yu S, Tresp V, Xu Z (2007) Stochastic relational models for discriminative link prediction. In: Proceedings of neural information processing systems. MIT Press, Cambridge, MA, pp 1553–1560
Kim M, Leskovec J (2011) The network completion problem: inferring missing nodes and edges in networks. In: Proceedings of SDM. pp 47–58
Leskovec J, Chakrabarti D, Kleinberg J, Faloutsos C, Ghahramani Z (2010) Kronecker graphs: an approach to modeling networks. JMLR
Clauset A, Moore C, Newman MEJ (2008) Hierarchical structure and the prediction of missing links in networks. Nature 453:98–101
Backstrom L, Leskovec J (2011) Supervised random walks: predicting and recommending links in social networks. In: Proceedings of ACM international conference on web search and data mining (WSDM)
Kim M, Leskovec J (2010) Multiplicative attribute graph model of real-world networks. arXiv:1009.3499v2
Rhodes CJ (2011) The use of open source intelligence in the construction of covert social networks. Counterterrorism and open source intelligence. Lect Notes Soc Netw (LNSN 2). Springer, Wien
Acknowledgments
This work is supported by National Basic Research Program of China (973 program) with Grant No. 2011CB706900, National Natural Science Foundation of China (Grant No. 70971128), Beijing Natural Science Foundation (Grant No. 9102022), and the President Fund of UCAS (Grant No. O95101HY00).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jiang, C., Wang, J., Yu, H. (2014). Link Prediction Based on Sequential Bayesian Updating in a Terrorist Network. In: Sun, F., Li, T., Li, H. (eds) Foundations and Applications of Intelligent Systems. Advances in Intelligent Systems and Computing, vol 213. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37829-4_27
Download citation
DOI: https://doi.org/10.1007/978-3-642-37829-4_27
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37828-7
Online ISBN: 978-3-642-37829-4
eBook Packages: EngineeringEngineering (R0)