
This Article  
 
Share  
Bibliographic References  
Add to:  
Digg Furl Spurl Blink Simpy Del.icio.us Y!MyWeb  
Search  
 
ASCII Text  x  
Shoude Lin, Hans Chalupsky, "Discovering and Explaining Abnormal Nodes in Semantic Graphs," IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 8, pp. 10391052, August, 2008.  
BibTex  x  
@article{ 10.1109/TKDE.2007.190691, author = {Shoude Lin and Hans Chalupsky}, title = {Discovering and Explaining Abnormal Nodes in Semantic Graphs}, journal ={IEEE Transactions on Knowledge and Data Engineering}, volume = {20}, number = {8}, issn = {10414347}, year = {2008}, pages = {10391052}, doi = {http://doi.ieeecomputersociety.org/10.1109/TKDE.2007.190691}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, }  
RefWorks Procite/RefMan/Endnote  x  
TY  JOUR JO  IEEE Transactions on Knowledge and Data Engineering TI  Discovering and Explaining Abnormal Nodes in Semantic Graphs IS  8 SN  10414347 SP1039 EP1052 EPD  10391052 A1  Shoude Lin, A1  Hans Chalupsky, PY  2008 KW  Data mining KW  Natural language KW  Natural Language Processing KW  Security KW  Semantic networks KW  Graphs and networks VL  20 JA  IEEE Transactions on Knowledge and Data Engineering ER   
[1] M. Sparrow, “The Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects,” Social Networks, vol. 13, pp. 251274, 1991.
[2] T. Senator and H. Goldberg, “Break Detection Systems,” Handbook of Knowledge Discovery and Data Mining, W. Kloesgen and J.Zytkow, eds., pp. 863873, Oxford Univ. Press, 2002.
[3] D. Jensen, M. Rattigan, and H. Blau, “Information Awareness: A Prospective Technical Assessment,” Proc. Ninth ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining (KDD '03), pp. 378387, 2003.
[4] J. Wang, F. Wang, and D. Zeng, “Rule$+$ Exception LearningBased Class Specification and Labeling in Intelligence and Security Analysis,” Proc. Workshop Intelligence and Security Informatics (WISI '06), vol. 3917, pp. 181182, 2006.
[5] V. Krebs, “Mapping Networks of Terrorist Cells,” Connections, vol. 24, no. 3, pp. 4352, 2001.
[6] J. Qin, J. Xu, D. Hu, M. Sageman, and H. Chen, “Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network,” Intelligence and Security Informatics, P. Kantor et al., ed., pp. 287304, Springer, 2005.
[7] “Total Information Overload,” Scientific Am., editorial, Mar. 2003.
[8] B. Simons and E. Spafford, Letter from the Association for Computing Machinery's US Public Policy Committee to the Senate Armed Services Committee, Jan. 2003.
[9] R. Hill, “NonWellFounded Set Theory and the Circular Semantics of Semantic Networks,” Intelligent Systems: Third Golden West International Conference: Edited and Selected Papers, E.Yfantis,ed., pp. 375386, Kluwer, 1995.
[10] S. Lin, “Modeling, Finding, and Explaining Abnormal Instances in MultiRelational Networks,” PhD dissertation, Dept. of Computer Science, Univ. of Southern California, 2006.
[11] S. Ramaswamy, R. Rastogi, and K. Shim, “Efficient Algorithms for Mining Outliers from Large Data Sets,” Proc. ACM SIGMOD '00, pp. 427438, 2000.
[12] S. Lin and H. Chalupsky, “Issues of Verification for Unsupervised Discovery Systems,” Proc. Workshop Link Analysis and Group Detection (LinkKDD '04), 2004.
[13] R. Schrag, “A Performance Evaluation Laboratory for Automated Threat Detection Technologies,” Proc. Performance Measures for Intelligent Systems Workshop (PerMIS '06), 2006.
[14] L. Page, S. Brin, R. Motwani, and T. Winograd, “The PageRank Citation Ranking: Bringing Order to the Web,” Proc. Seventh Int'l World Wide Web Conf. (WWW '98), pp. 161172, 1998.
[15] J. Kleinberg, “Authoritative Sources in a Hyperlinked Environment,” J. ACM, vol. 46, no. 5, pp. 604632, 1999.
[16] S. Wasserman and K. Faust, Social Network Analysis: Methods and Applications. Cambridge Univ. Press, 1994.
[17] S. Dongen, “A Cluster Algorithm for Graphs,” Technical Report INSR0010, Nat'l Research Inst. for Math. and Computer Science, Amsterdam, The Netherlands, 2000.
[18] J. Adibi, H. Chalupsky, E. Melz, and A. Valente, “The KOJAK Group Finder: Connecting the Dots via Integrated KnowledgeBased and Statistical Reasoning,” Proc. 16th Innovative Applications of Artificial Intelligence Conf. (IAAI '04), pp. 800807, 2004.
[19] S. Lin, “Generating Natural Language Descriptions for Paths in the Semantic Network,” final project report, Dept. of Linguistics, Univ. of Southern California, 2006.
[20] R. Popp, “Countering Terrorism through Information Technology,” Comm. ACM, vol. 47, no. 3, pp. 3643, 2004.
[21] H. Chen and F. Wang, “Artificial Intelligence for Homeland Security,” IEEE Intelligent Systems, vol. 20, no. 5, pp. 1216, 2005.
[22] J. Xu and H. Chen, “Criminal Network Analysis and Visualization,” Comm. ACM, vol. 48, no. 6, pp. 101107, 2005.
[23] H. Chen and J. Xu, “Intelligence and Security Informatics for National Security: A Knowledge Discovery Perspective,” Ann. Rev. of Information Science and Technology, vol. 40, pp. 229289, 2006.
[24] B. Taskar, M.F. Wong, P. Abbeel, and D. Koller, “Link Prediction in Relational Data,” Advances Neural Information Processing Systems —Proc. 17th Ann. Conf. Neural Information Processing Systems (NIPS '03), 2004.
[25] S. Adafre and M. Rijke, “Discovering Missing Links in Wikipedia,” Proc. Workshop Link Discovery: Issues, Approaches and Applications (LinkKDD '05), 2005.
[26] R. Bunescu and R. Mooney, “Relational Markov Networks for Collective Information Extraction,” Proc. 21st Int'l Conf. Machine Learning (ICML '04), 2004.
[27] J. Neville and D. Jensen, “Dependency Networks for Relational Data,” Proc. Fourth IEEE Int'l Conf. Data Mining (ICDM '04), 2004.
[28] M. Jaeger, “Relational Bayesian Networks,” Proc. 13th Ann. Conf. Uncertainty in Artificial Intelligence (UAI '97), 1997.
[29] S. Lin and H. Chalupsky, “Unsupervised Link Discovery in MultiRelational Data via Rarity Analysis,” Proc. Third IEEE Int'l Conf. Data Mining (ICDM '03), pp. 171178, 2003.
[30] S. Lin and H. Chalupsky, “Using Unsupervised Link Discovery Methods to Find Interesting Facts and Connections in a Bibliography Dataset,” SIGKDD Explorations, vol. 5, no. 2, pp.173178, Dec. 2003.
[31] S. Dzeroski, “Data Mining in a Nutshell,” Relational Data Mining, S. Dzeroski and N. Lavrac, eds. pp. 127, Springer, 2001.
[32] K. Morik, “Detecting Interesting Instances,” Proc. ESF Exploratory Workshop Pattern Detection and Discovery, 2002.
[33] F. Angiulli, R. BenEliyahuZohary, and L. Palopoli, “Outlier Detection Using Default Logic,” Proc. 18th Int'l Joint Conf. Artificial Intelligence (IJCAI '03), pp. 833838, 2003.
[34] P. Flach and N. Lachiche, “ConfirmationGuided Discovery of FirstOrder Rules with Tertius,” Machine Learning, vol. 42, nos. 12, pp. 6195, 2001.
[35] S. Wrobel, “An Algorithm for MultiRelational Discovery of Subgroups,” Proc. First European Symp. Principles of Data Mining and Knowledge Discovery (PKDD '97), pp. 7887, 1997.
[36] W. Klosgen, “Explora: A Multipattern and Multistrategy Discovery Assistant,” Advances in Knowledge Discovery and Data Mining, U. Fayyad et al., ed., pp. 249271, AAAI/MIT Press, 1996.
[37] K. Yamanishi and J. Takeuchi, “Discovering Outlier Filtering Rules from Unlabeled Data: Combining a Supervised Learner with an Unsupervised Learner,” Proc. Seventh ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining (KDD '01), pp. 389394, 2001.
[38] Y. Yao, Y. Zhao, and R. Maguire, “ExplanationOriented Association Mining Using a Combination of Unsupervised and Supervised Learning Algorithms,” Proc. Canadian Conf. Artificial Intelligence, pp. 527531, 2003.
[39] Y. Yao, Y. Zhao, and R. Maguire, “Explanation Oriented Association Mining Using Rough Set Theory,” Proc. Ninth Int'l Conf. Rough Sets, Fuzzy Sets, Data Mining, and GranularSoft Computing (RSFDGrC '03), pp. 165172, 2003.