Skip to main content

Link Prediction Based on Sequential Bayesian Updating in a Terrorist Network

  • Conference paper
  • First Online:
Foundations and Applications of Intelligent Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 213))

  • 2117 Accesses

Abstract

Link prediction techniques are being increasingly employed to detect covert networks, such as terrorist networks. The challenging problem we have been facing is to improve the performance and accuracy of link prediction methods. We develop an algorithm based on Sequential Bayesian Updating method that combines probabilistic reasoning techniques. This algorithm adopts a recursive way to estimate the statistical confidence of the results a prior and then regenerate observed graphs to make inferences. This novel idea can be efficiently adapt to small datasets in link prediction problems of various engineering applications and science researches. Our experiment with a terrorist network shows significant improvement in terms of prediction accuracy measured by mean average precision. This algorithm has also been integrated into an emergency decision support system (NBCDSS) to provide decision-makers’ auxiliary information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rhodes CJ, Keefe EMJ (2007) Social network topology: a bayesian approach. J Oper Res Soc 58:1605–1611

    Article  Google Scholar 

  2. Greengrass E (2000) Information retrieval: a survey. University of Maryland, Baltimore

    Google Scholar 

  3. Lu L, Medo M, Yeung CH et al (2012) Recommender systems, Phys Rep 519(1):1–49

    Google Scholar 

  4. Jansen R et al (2003) A Bayesian networks approach for predicting protein–protein interactions from genomic data. Science 302:449–453

    Article  Google Scholar 

  5. Yu H et al (2008) High-quality binary protein interaction map of the yeast interactome network. Science 322:104–110

    Article  Google Scholar 

  6. Xiang E (2008) A survey on link prediction models for social network data. PhD thesis, Hong Kong UST, Department of Computer Science and Engineering

    Google Scholar 

  7. Resnik P (1995b) Using information content to evaluate semantic similarity in a taxonomy. In: Proceedings of IJCAI-95. Montreal, Canada pp 448–453

    Google Scholar 

  8. Frakes WB, Baeza-Yates R (1992) Information retrieval: data structures and algorithms. Prentice Hall, US

    Google Scholar 

  9. Hindle D (1990) Noun classification from predicate argument structures. In: Proceedings of the 28th annual meeting of the association for computational linguistics, pp 268–275

    Google Scholar 

  10. Jin EM, Girvan M, Newman MEJ (2001) The structure of growing social networks. Phys Rev Lett E 64:046132

    Google Scholar 

  11. Salton G, McGill MJ (1983) Introduction to modern information retrieval. McGraw-Hill, Maidenherd

    Google Scholar 

  12. Adamic LA, Adar E (2003) Friends and neighbors on the web. Soc Netw 25(3):211–230, July 2003

    Google Scholar 

  13. Mitzenmacher M (2001) A brief history of log normal and power law distributions. In: Proceedings of the Allerton conference on communication, control, and computing, pp 182–191

    Google Scholar 

  14. Rhodes CJ (2009) Inference approaches to constructing covert social network topologies. In: Memon N, Farley JD, Hicks DL, Rosenoorn T (eds) Mathematical methods in counter-terrorism. Springer, Berlin

    Google Scholar 

  15. Xu Z, Tresp V, Yu K, Yu S, Kriegel H-P (2005) Dirichlet enhanced relational learning. In: Proceedings of the 22nd international conference on machine learning. Bonn, Germany, p 1004

    Google Scholar 

  16. Yu K, Chu W, Yu S, Tresp V, Xu Z (2007) Stochastic relational models for discriminative link prediction. In: Proceedings of neural information processing systems. MIT Press, Cambridge, MA, pp 1553–1560

    Google Scholar 

  17. Kim M, Leskovec J (2011) The network completion problem: inferring missing nodes and edges in networks. In: Proceedings of SDM. pp 47–58

    Google Scholar 

  18. Leskovec J, Chakrabarti D, Kleinberg J, Faloutsos C, Ghahramani Z (2010) Kronecker graphs: an approach to modeling networks. JMLR

    Google Scholar 

  19. Clauset A, Moore C, Newman MEJ (2008) Hierarchical structure and the prediction of missing links in networks. Nature 453:98–101

    Article  Google Scholar 

  20. Backstrom L, Leskovec J (2011) Supervised random walks: predicting and recommending links in social networks. In: Proceedings of ACM international conference on web search and data mining (WSDM)

    Google Scholar 

  21. Kim M, Leskovec J (2010) Multiplicative attribute graph model of real-world networks. arXiv:1009.3499v2

    Google Scholar 

  22. Rhodes CJ (2011) The use of open source intelligence in the construction of covert social networks. Counterterrorism and open source intelligence. Lect Notes Soc Netw (LNSN 2). Springer, Wien

    Google Scholar 

Download references

Acknowledgments

This work is supported by National Basic Research Program of China (973 program) with Grant No. 2011CB706900, National Natural Science Foundation of China (Grant No. 70971128), Beijing Natural Science Foundation (Grant No. 9102022), and the President Fund of UCAS (Grant No. O95101HY00).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hua Yu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jiang, C., Wang, J., Yu, H. (2014). Link Prediction Based on Sequential Bayesian Updating in a Terrorist Network. In: Sun, F., Li, T., Li, H. (eds) Foundations and Applications of Intelligent Systems. Advances in Intelligent Systems and Computing, vol 213. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37829-4_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-37829-4_27

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-37828-7

  • Online ISBN: 978-3-642-37829-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics