Haiying Tu

Learn More
— A collaboration scheme for information integration among multiple agencies (and/or various divisions within a single agency) is designed using hierarchical and hybrid Bayesian networks (HHBNs). In this scheme, raw information is represented by transactions (such as communication, travel, financing), and information entities to be integrated are modeled as(More)
The ability of terrorist networks to conduct sophisticated and simultaneous attacks – the most recent one on March 11, 2004 in Madrid, Spain – suggests that there is a significant need for developing information technology tools for counter-terrorism analysis. These technologies could empower intelligence analysts to find information faster, share, and(More)
—In reaction to the tragic events of September 11 th , 2001, DARPA made plans to develop a Terrorism Information Awareness system with an eye to the detection and in-terdiction of terrorist activities. Under this program and in conjunction with Aptima, Inc., the University of Connecti-cut is developing its Adaptive Safety Analysis and Monitoring (ASAM) tool(More)
The problem of detecting an anomaly (or abnormal event) is such that the distribution of observations is different before and after an unknown onset time, and the objective is to detect the change by statistically matching the observed pattern with that predicted by a model. In the context of asymmetric threats 1 , the detection of an abnormal situation(More)
A new methodology is given in this paper to obtain a near-optimal strategy (i.e., specification of courses of action over time), which is also robust to environmental perturbations (unexpected events and/or parameter uncertainties), to achieve the desired effects. A dynamic Bayesian network (DBN)-based stochastic mission model is employed to represent the(More)
Introduction Information concerning the potential whereabouts and activities of terrorists can be extrapolated from the massive amount of intelligence reported daily to US intelligence agencies. The events encapsulated in these reports, and, in particular, the sequence of these events, can be used to probabilistically infer the activities of terrorists. In(More)
In this paper, we introduce an advanced software tool for modeling asymmetric threats, the Adaptive Safety Analysis and Monitoring (ASAM) system. The ASAM system is a hybrid model-based system for assisting intelligence analysts to identify asymmetric threats, to predict possible evolution of the suspicious activities, and to suggest strategies for(More)
—One of the major challenges in counter-terrorism analysis involves connecting the relatively few and sparse terrorism-related dots embedded within massive amounts of data flowing into the government's intelligence and counter-terrorism agencies. Information technologies have the potential to empower intelligence agencies or analysts with the ability to(More)