Haiying Tu

Learn More
The ability of terrorist networks to conduct sophisticated and simultaneous attacks – the most recent one on March 11, 2004 in Madrid, Spain – suggests that there is a significant need for developing information technology tools for counter-terrorism analysis. These technologies could empower intelligence analysts to find information faster, share, and(More)
— A collaboration scheme for information integration among multiple agencies (and/or various divisions within a single agency) is designed using hierarchical and hybrid Bayesian networks (HHBNs). In this scheme, raw information is represented by transactions (such as communication, travel, financing), and information entities to be integrated are modeled as(More)
The problem of detecting an anomaly (or abnormal event) is such that the distribution of observations is different before and after an unknown onset time, and the objective is to detect the change by statistically matching the observed pattern with that predicted by a model. In the context of asymmetric threats 1 , the detection of an abnormal situation(More)
A new methodology is given in this paper to obtain a near-optimal strategy (i.e., specification of courses of action over time), which is also robust to environmental perturbations (unexpected events and/or parameter uncertainties), to achieve the desired effects. A dynamic Bayesian network (DBN)-based stochastic mission model is employed to represent the(More)
Introduction Information concerning the potential whereabouts and activities of terrorists can be extrapolated from the massive amount of intelligence reported daily to US intelligence agencies. The events encapsulated in these reports, and, in particular, the sequence of these events, can be used to probabilistically infer the activities of terrorists. In(More)
In this paper, we introduce an advanced software tool for modeling asymmetric threats, the Adaptive Safety Analysis and Monitoring (ASAM) system. The ASAM system is a hybrid model-based system for assisting intelligence analysts to identify asymmetric threats, to predict possible evolution of the suspicious activities, and to suggest strategies for(More)
  • 1