2010
DOI: 10.1007/s10506-010-9085-9
|View full text |Cite
|
Sign up to set email alerts
|

Disclosing false identity through hybrid link analysis

Abstract: Boongoen, T., Shen, Q., Price, C. J. (2010). Disclosing false identity through hybrid link analysis. Artificial Intelligence and Law, 18 (1), 77-102 Sponsorship: EPSRC RONO: EP/D057086/1Combating the identity problem is crucial and urgent as false identity has become a common denominator of many serious crimes, including mafia trafficking and terrorism. Without correct identification, it is very difficult for law enforcement authority to intervene, or even trace terrorists? activities. Amongst several identity… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
30
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
5
4

Relationship

3
6

Authors

Journals

citations
Cited by 39 publications
(30 citation statements)
references
References 47 publications
0
30
0
Order By: Relevance
“…Although the predicting accuracy is not sufficiently high to meet human expectation, it is worth recognising that the task of identifying "strong" links is much more difficult than just finding whether there is a general link (Boongoen et al 2010). Such a detection is also of practical significance since in real-world applications, it is the identification of any variable pair that is associated with the most "strong" link that is generally more attractive to the users.…”
Section: Experimental Results For Real Datamentioning
confidence: 99%
“…Although the predicting accuracy is not sufficiently high to meet human expectation, it is worth recognising that the task of identifying "strong" links is much more difficult than just finding whether there is a general link (Boongoen et al 2010). Such a detection is also of practical significance since in real-world applications, it is the identification of any variable pair that is associated with the most "strong" link that is generally more attractive to the users.…”
Section: Experimental Results For Real Datamentioning
confidence: 99%
“…In particular, it has a major implication in the area of serious crime modelling and analysis. For example, in developing intelligent systems for intelligence data monitoring [1,21], an important trade-off needs to be considered: On the one hand, it is essential not to miss out any potentially significant scenarios that may later explain the observed evidence; on the other hand, too many unsorted and particularly, spurious scenarios may confuse human analysts. Thus, it is desirable to filter the created scenario space with respect to certain quality measures of the generated scenario descriptions.…”
Section: Discussionmentioning
confidence: 99%
“…Note that WTU is based on the uniqueness measure developed as part of the algorithm called 'connected-path', which has been introduced by Boongoen et al (2010) for the task of alias detection. Given a graph G(V, E) in which objects and their relations are represented with members of the sets of vertices V and edges E, respectively, a uniqueness measure k ij UQ of any two objects i and j (denoted by vertices v i , v j ∈ V) can be approximated from each joint neighbour k (denoted by the vertex v k ∈ V) as follows:…”
Section: N×pmentioning
confidence: 99%