Redirigiendo al acceso original de articulo en 18 segundos...
Inicio  /  Computers  /  Vol: 8 Par: 1 (2019)  /  Artículo
ARTÍCULO
TITULO

Hidden Link Prediction in Criminal Networks Using the Deep Reinforcement Learning Technique

Marcus Lim    
Azween Abdullah    
NZ Jhanjhi and Mahadevan Supramaniam    

Resumen

Criminal network activities, which are usually secret and stealthy, present certain difficulties in conducting criminal network analysis (CNA) because of the lack of complete datasets. The collection of criminal activities data in these networks tends to be incomplete and inconsistent, which is reflected structurally in the criminal network in the form of missing nodes (actors) and links (relationships). Criminal networks are commonly analyzed using social network analysis (SNA) models. Most machine learning techniques that rely on the metrics of SNA models in the development of hidden or missing link prediction models utilize supervised learning. However, supervised learning usually requires the availability of a large dataset to train the link prediction model in order to achieve an optimum performance level. Therefore, this research is conducted to explore the application of deep reinforcement learning (DRL) in developing a criminal network hidden links prediction model from the reconstruction of a corrupted criminal network dataset. The experiment conducted on the model indicates that the dataset generated by the DRL model through self-play or self-simulation can be used to train the link prediction model. The DRL link prediction model exhibits a better performance than a conventional supervised machine learning technique, such as the gradient boosting machine (GBM) trained with a relatively smaller domain dataset.

 Artículos similares

       
 
Ricardo Resende de Mendonça, Daniel Felix de Brito, Ferrucio de Franco Rosa, Júlio Cesar dos Reis and Rodrigo Bonacin    
Criminals use online social networks for various activities by including communication, planning, and execution of criminal acts. They often employ ciphered posts using slang expressions, which are restricted to specific groups. Although literature shows... ver más
Revista: Information

 
Julio Suarez-Paez, Mayra Salcedo-Gonzalez, Alfonso Climente, Manuel Esteve, Jon Ander Gómez, Carlos Enrique Palau and Israel Pérez-Llopis    
This paper shows a Novel Low Processing Time System focused on criminal activities detection based on real-time video analysis applied to Command and Control Citizen Security Centers. This system was applied to the detection and classification of crimina... ver más
Revista: Information

 
Leslie Ching Ow Tiong, Yunli Lee and Andrew Beng Jin Teoh    
The proposed periocular biometric network can apply to any application that requires identity management, such as homeland security, border controls, access control, criminal investigation, etc.
Revista: Applied Sciences

 
Nureni Ayofe Azeez, Tolulope Jide Ayemobola, Sanjay Misra, Rytis Maskeliunas and Robertas Dama?evicius    
Ubiquitous nature of Internet services across the globe has undoubtedly expanded the strategies and operational mode being used by cybercriminals to perpetrate their unlawful activities through intrusion on various networks. Network intrusion has led to ... ver más
Revista: Computers

 
Gonzalo Arias, Andrés Sánchez    
ABSTRACT There are some puzzles in digital currency matter. First, finding the best definition. Digital currencies have specific features that make necessary to mention in its definition. The second puzzle is the function of Internet. It is important bec... ver más