Detecting and classifying anomalous behavior in spatiotemporal network data ∗
@inproceedings{Young2014DetectingAC, title={Detecting and classifying anomalous behavior in spatiotemporal network data ∗}, author={William Chad Young and Joshua Evan Blumenstock and Emily B. Fox and Tyler H. McCormick}, year={2014} }
We investigate different models for detecting and classifying important geopolitical events in high-frequency spatiotemporal network data. Building on previous empirical work on the network response to real-world events, our goal is to develop a generative model that can identify the time, location, and nature of different emergency and non-emergency events. As a testbed for these models, we use a large dataset containing billions of anonymized mobile phone calls and text messages from…
18 Citations
Voila: Visual Anomaly Detection and Monitoring with Streaming Spatiotemporal Data
- Computer ScienceIEEE Transactions on Visualization and Computer Graphics
- 2018
This work proposes a novel tensor-based anomaly analysis algorithm with visualization and interaction design that dynamically produces contextualized, interpretable data summaries and allows for interactively ranking anomalous patterns based on user input.
Countrywide arrhythmia: emergency event detection using mobile phone data
- SociologyEPJ Data Science
- 2016
A stochastic model, namely a Markov modulated Poisson process, is applied for spatio-temporal detection of hourly and daily behavioral anomalies associated with violent events, riots, as well as social non-emergency events such as holidays, sports events.
Meta-Morisita Index: Anomaly Behaviour Detection for Large Scale Tracking Data with Spatio-Temporal Marks
- Computer Science2017 IEEE International Conference on Data Mining Workshops (ICDMW)
- 2017
A spatial point pattern analysis method (the Morisita Index) is extended with metadata analysis, which includes anomaly behaviour detection and unsupervised learning to support spatio-temporal data analysis (on both physical and cyber data) and demonstrates its practical use.
Spatiotemporal Detection of Unusual Human Population Behavior Using Mobile Phone Data
- PsychologyPloS one
- 2015
This study proposes an efficient system for spatiotemporal detection of behavioral anomalies from mobile phone data and compares sites with behavioral anomalies to an extensive database of emergency and non-emergency events in Rwanda, finding significant temporal and spatial variance in responses to extreme events.
Anomaly behaviour detection based on the meta-Morisita index for large scale spatio-temporal data set
- Computer ScienceJ. Big Data
- 2018
The resulting framework is robust and has the capability to detect anomalies among large-scale spatio-temporal data using meta-data based on point pattern analysis, and returns visualized reports to end users.
Detecting climate adaptation with mobile network data in Bangladesh: anomalies in communication, mobility and consumption patterns during cyclone Mahasen
- Environmental ScienceClimatic Change
- 2016
It is found that anomalous patterns of mobility and calling frequency correlate with rainfall intensity and use calling frequency to construct a spatiotemporal distribution of cyclone impact as the storm moves across the affected region.
The Illusion of Change: Correcting for Biases in Change Inference for Sparse, Societal-Scale Data
- Computer ScienceWWW
- 2019
This work provides a general framework for inferring changes in social metrics when dealing with non-stationary sparsity and proposes a plug-in correction that can be applied to any estimator, including several recently proposed procedures.
Online anomaly detection over Big Data streams
- Computer Science2015 IEEE International Conference on Big Data (Big Data)
- 2015
A combination of the two metrics put forward can be applied to detect several types of anomalies - like infrastructure failures, hardware misconfiguration or user-driven anomalies - in large-scale telecommunication networks.
Spatial-Temporal Anomaly Detection Using Security Visual Analytics via Entropy Graph and Eigen Matrix
- Computer Science2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)
- 2017
The analysis conducted by using this program can support correlating events in both the spatial and temporal domains which will lead the investigators to determine probable causes for potential malicious events.
Latent Surface Models for Networks Using Aggregated Relational Data
- Computer Science
- 2015
A latent surface representation of social network structure for partially observed network data is introduced and a multivariate measure of expected (latent) distance between an observed actor and unobserved actors with given features is derived.
References
SHOWING 1-10 OF 12 REFERENCES
EVENT DETECTION IN TIME SERIES OF MOBILE COMMUNICATION GRAPHS
- Computer Science
- 2010
An algorithm that operates on a time-varying network of agents with edges representing interactions between them and (1) spots "anomalous" points in time at which many agents "change" their behavior in a way it deviates from the norm; and (2) attributes the detected anomaly to those agents that contribute to the " change" the most.
Detecting Anomalous Behaviors Using Structural Properties of Social Networks
- Computer ScienceSBP
- 2013
It is argued that given limited analysis resources, it is best to select edges that are located around 'hubs' in the network, resulting in an improved ability to detect anomalous "real world event" events.
Collective Response of Human Populations to Large-Scale Emergencies
- BusinessPloS one
- 2011
Real-time changes in communication and mobility patterns in the vicinity of eight emergencies, such as bomb attacks and earthquakes, are identified, comparing these with eight non-emergencies, like concerts and sporting events and finding that communication spikes accompanying emergencies are both spatially and temporally localized.
The Activation of Core Social Networks in the Wake of the 22 July Oslo Bombing
- Computer Science2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
- 2012
Empirical mobile traffic data illuminate exceptional behavior, just after the bombing in Oslo, where individuals first focus on their single closest contact ('best friend'), but, soon after, switch to spending more mobile communication resources than average on contacts ranked 2 - 5.
Temporal Collaborative Filtering with Bayesian Probabilistic Tensor Factorization
- Computer ScienceSDM
- 2010
This work proposes a factor-based algorithm that is able to take time into account, and provides a fully Bayesian treatment to avoid tuning parameters and achieve automatic model complexity control.
People, Quakes, and Communications: Inferences from Call Dynamics about a Seismic Event and its Influences on a Population
- GeologyAAAI Spring Symposium: Artificial Intelligence for Development
- 2010
The prospect of inferring the epicenter and influences of seismic activity from changes in background phone communication activities logged at cell towers, using the persistence of call anomalies after the earthquake as a proxy for lasting influences and the potential need for assistance is explored.
bcp: An R Package for Performing a Bayesian Analysis of Change Point Problems
- Computer Science
- 2007
A brief summary of selected work on change point problems, both preceding and following Barry and Hartigan's approach, is provided and a new R package, bcp, is offered, implementing their analysis.
Hidden semi-Markov models ( HSMMs )
- Computer Science
- 2002
This paper is agnostic about the form of P (Y (Gt)|q, l).
A tutorial on hidden Markov models and selected applications in speech recognition
- ArtProc. IEEE
- 1989
The fabric comprises a novel type of netting which will have particular utility in screening out mosquitoes and like insects and pests. The fabric is defined of voids having depth as well as width…