期刊文献+

一种新的犯罪团伙挖掘算法

A New Criminal Gang Mining Algorithm
原文传递
导出
摘要 为了利用图模式挖掘犯罪情报网络中的核心团伙和核心人物,提高犯罪网络威胁预测和识别的效率,提出一种新的核心团伙挖掘算法(Core Gang Mining Algorithm,CGMA).对海量的犯罪情报网络数据集建立相应的无向简单图模型,通过改进图挖掘方式,构建候选核心团伙集的数据结构,并提出由k-团伙通过连接和扩展2种操作得到(k+1)-团伙,从各个不同的图数据中统计其频度,最后在模拟数据集和真实数据集上验证算法CGMA的准确性和时间复杂度.该算法避免了传统的图模式挖掘中的子图同构问题,同时也优于其他常用的犯罪团伙挖掘算法.试验结果表明:该算法能对犯罪核心团伙信息进行有效预测. In order to utilize graph patterns to mine core gangs and key characters in criminal intelligence networks and improve the efficiency of threat prediction and identification in criminal networks,a new core gang mining algorithm(CGMA)is proposed.Data set based on vast amounts of criminal intelligence network,the undirected simple graph model is established,by improving the mining method and building candidate core gangs set data structure.It obtains the k-gangs by join and extension of two(k+1)-gang from different graph data statistics of the frequency.Finally,the accuracy and time complexity of the algorithm CGMA are verified on the real data set,the algorithm avoids the problem of subgraph isomorphism in traditional graph pattern mining,which is better than other common mining algorithms of criminal gangs.Experimental results show that the algorithm can effectively predict the information of criminal core groups.
作者 唐德权 黄金贵 史伟奇 TANG Dequan;HUANG Jingui;SHI Weiqi(Department of Information Technology,Hunan Police Academy,Changsha 410138,China;College of Information Science and Engineering,Hunan Normal University,Changsha 410081,China)
出处 《湖南科技大学学报(自然科学版)》 CAS 北大核心 2023年第2期80-87,共8页 Journal of Hunan University of Science And Technology:Natural Science Edition
基金 湖南省教育科学“十四五”规划课题资助项目(XJK23BGD034) 湖南警察学院高层次人才科研启动专项基金资助项目(2022KYQD03) 国家自然科学基金资助项目(61471169)。
关键词 图模式 核心团伙 图挖掘 连接和扩展 子图同构 graph pattern core gang graph mining join and extension subgraph isomorphism
  • 相关文献

参考文献3

二级参考文献35

  • 1陈刚,李松岩.对以异常行为信息为基础科学构建积分预警系统的思考[J].北京人民警察学院学报,2013(1):44-47. 被引量:14
  • 2大谷实,王昭武.日本刑法中正犯与共犯的区别——与中国刑法中的“共同犯罪”相比照[J].法学评论,2002,20(6):113-119. 被引量:49
  • 3FREEMAN L. Centrality in social network: conceptual clarification [J]. Social Networks, 1979, 1:215-239.
  • 4LIU Xiaoming, BOLLEN J, ENSON M L. Co-authorship networks in the digital library research community [ J ]. Information Project & Management, 2005,41 : 1462 - 1480.
  • 5XU Jennifer, CHEN Hsinchun. CrimeNet Explorer: A framework for criminal network knowledge discovery [ J ]. ACM Transactions on Information Systems, 2005, 23 (2) :201 -226.
  • 6KREBS V. Mapping networks of terrorist cells [ J ]. Con- nections, 2002, 24(3): 43-52.
  • 7SPARROW M K. The application of network analysis to criminal intelligence: An assessment of the prospects [J]. Social Networks, 1991, 13(3) : 251 -274.
  • 8COLES N. It's not what you know- It's who you know that counts. Analyzing serious crime groups as social networks [J]. British Journal of Criminology, 2001, 41 (4) : 580 - 594.
  • 9KLERKS P. The network paradigm applied to criminal or- ganizations [J]. Connection, 2001, 24(3):53-65.
  • 10WILLIAMS P. Transnational criminal networks [ C ]//J Arquilla and D. Ronfeldt ( eds ) , Networks and Netwars : The Future of Terror, Crime and Militancy. Santa Moni- ca: and Corporation, 2001:61 -97.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部