2008
DOI: 10.1109/tkde.2007.190691
|View full text |Cite
|
Sign up to set email alerts
|

Discovering and Explaining Abnormal Nodes in Semantic Graphs

Abstract: Abstract-An important problem in the area of homeland security is to identify abnormal or suspicious entities in large data sets. Although there are methods from data mining and social network analysis focusing on finding patterns or central nodes from networks or numerical data sets, there has been little work aimed at discovering abnormal instances in large complex semantic graphs, whose nodes are richly connected with many different types of links. In this paper, we describe a novel unsupervised framework t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 36 publications
(12 citation statements)
references
References 30 publications
0
12
0
Order By: Relevance
“…The Table 1 shows the various selection strategies and their path type formats. The path type is obtained by reducing the path using variable relaxation approach [2].…”
Section: Definition Of Selection Strategiesmentioning
confidence: 99%
See 1 more Smart Citation
“…The Table 1 shows the various selection strategies and their path type formats. The path type is obtained by reducing the path using variable relaxation approach [2].…”
Section: Definition Of Selection Strategiesmentioning
confidence: 99%
“…SoNMine finds the influential node based on their behavioral profile which has contribution value of the nodes towards a specific behavioral path type. UNICORN is an already existing framework for the above mentioned purpose [2]. It has done its evaluation based on the relation only selection strategy and used the path length as 4 [11].…”
Section: Evaluation Of Sonminementioning
confidence: 99%
“…The semantic graph has been used by Shou-de Lin et.al [2] in an unsupervised framework UNICORN, to generate a profile from which suspicious nodes could be detected and uses a novel explanation system to verify the profiles using natural language processing. Shou-de Lin et.al [3] has also used the interestingness measure to determine the rarity using the node path and node loop discovery strategies.…”
Section: Related Workmentioning
confidence: 99%
“…The selection strategies have been considered here because it helps us to choose a path type which is collection of paths based on which the profile is generated [2]. These strategies are used basically in two circumstances namely path oriented selection strategy and constraint oriented selection strategy.…”
Section: Figure 2 Framework Of Sonminementioning
confidence: 99%
“…Secondly KPP2 determines the influence of a node's tie in the network based on the maximum ties of its connection to other nodes. [20] focus on finding abnormal instances in multi-relational networks (MNR) which uses unsupervised framework to model semantic profile and detects the suspicious node with the abnormal semantic profile. The authors propose a novel explanation mechanism that facilitates verification of the discovered results by generating humanunderstandable natural language explanations describing the unique aspects of these nodes.…”
Section: Key-player Identification and Sub-group Detectionmentioning
confidence: 99%