Criminal Networks Analysis in Missing Data scenarios through Graph
Distances
- URL: http://arxiv.org/abs/2103.00457v1
- Date: Sun, 28 Feb 2021 11:12:05 GMT
- Title: Criminal Networks Analysis in Missing Data scenarios through Graph
Distances
- Authors: Annamaria Ficara, Lucia Cavallaro, Francesco Curreri, Giacomo Fiumara,
Pasquale De Meo, Ovidiu Bagdasar, Wei Song, Antonio Liotta
- Abstract summary: In this paper we analyse nine real criminal networks of different nature.
We quantify the impact of incomplete data and to determine which network type is most affected by it.
- Score: 5.164732466825455
- License: http://creativecommons.org/licenses/by-sa/4.0/
- Abstract: Data collected in criminal investigations may suffer from: (i)
incompleteness, due to the covert nature of criminal organisations; (ii)
incorrectness, caused by either unintentional data collection errors and
intentional deception by criminals; (iii) inconsistency, when the same
information is collected into law enforcement databases multiple times, or in
different formats. In this paper we analyse nine real criminal networks of
different nature (i.e., Mafia networks, criminal street gangs and terrorist
organizations) in order to quantify the impact of incomplete data and to
determine which network type is most affected by it. The networks are firstly
pruned following two specific methods: (i) random edges removal, simulating the
scenario in which the Law Enforcement Agencies (LEAs) fail to intercept some
calls, or to spot sporadic meetings among suspects; (ii) nodes removal, that
catches the hypothesis in which some suspects cannot be intercepted or
investigated. Finally we compute spectral (i.e., Adjacency, Laplacian and
Normalised Laplacian Spectral Distances) and matrix (i.e., Root Euclidean
Distance) distances between the complete and pruned networks, which we compare
using statistical analysis. Our investigation identified two main features:
first, the overall understanding of the criminal networks remains high even
with incomplete data on criminal interactions (i.e., 10% removed edges);
second, removing even a small fraction of suspects not investigated (i.e., 2%
removed nodes) may lead to significant misinterpretation of the overall
network.
Related papers
- Differentially Private Data Release on Graphs: Inefficiencies and Unfairness [48.96399034594329]
This paper characterizes the impact of Differential Privacy on bias and unfairness in the context of releasing information about networks.
We consider a network release problem where the network structure is known to all, but the weights on edges must be released privately.
Our work provides theoretical foundations and empirical evidence into the bias and unfairness arising due to privacy in these networked decision problems.
arXiv Detail & Related papers (2024-08-08T08:37:37Z) - Transaction Fraud Detection via an Adaptive Graph Neural Network [64.9428588496749]
We propose an Adaptive Sampling and Aggregation-based Graph Neural Network (ASA-GNN) that learns discriminative representations to improve the performance of transaction fraud detection.
A neighbor sampling strategy is performed to filter noisy nodes and supplement information for fraudulent nodes.
Experiments on three real financial datasets demonstrate that the proposed method ASA-GNN outperforms state-of-the-art ones.
arXiv Detail & Related papers (2023-07-11T07:48:39Z) - The Devil is in the Conflict: Disentangled Information Graph Neural
Networks for Fraud Detection [17.254383007779616]
We argue that the performance degradation is mainly attributed to the inconsistency between topology and attribute.
We propose a simple and effective method that uses the attention mechanism to adaptively fuse two views.
Our model can significantly outperform stateof-the-art baselines on real-world fraud detection datasets.
arXiv Detail & Related papers (2022-10-22T08:21:49Z) - Machine Learning Partners in Criminal Networks [1.0554048699217669]
We show that structural properties of political corruption, police intelligence, and money laundering networks can be used to predict missing criminal partnerships.
We also show that our approach can anticipate future criminal associations during the dynamic growth of corruption networks with significant accuracy.
arXiv Detail & Related papers (2022-09-07T14:03:59Z) - Deep Interpretable Criminal Charge Prediction and Algorithmic Bias [2.3347476425292717]
This paper addresses bias issues with post-hoc explanations to provide a trustable prediction of whether a person will receive future criminal charges.
Our approach shows consistent and reliable prediction precision and recall on a real-life dataset.
arXiv Detail & Related papers (2021-06-25T07:00:13Z) - Unveiling Anomalous Edges and Nominal Connectivity of Attributed
Networks [53.56901624204265]
The present work deals with uncovering anomalous edges in attributed graphs using two distinct formulations with complementary strengths.
The first relies on decomposing the graph data matrix into low rank plus sparse components to improve markedly performance.
The second broadens the scope of the first by performing robust recovery of the unperturbed graph, which enhances the anomaly identification performance.
arXiv Detail & Related papers (2021-04-17T20:00:40Z) - Joint Inference of Diffusion and Structure in Partially Observed Social
Networks Using Coupled Matrix Factorization [3.399624105745357]
In this paper, a model is learned from partially observed data to infer unobserved diffusion and structure networks.
The interrelations among links of nodes and cascade processes are utilized in the proposed method via learning and low-dimensional latent factors.
Experiments on these synthetic and real-world datasets show that the proposed method successfully detects invisible social behaviors, predicts links, and identifies latent features.
arXiv Detail & Related papers (2020-10-03T17:48:57Z) - Graph Backdoor [53.70971502299977]
We present GTA, the first backdoor attack on graph neural networks (GNNs)
GTA departs in significant ways: it defines triggers as specific subgraphs, including both topological structures and descriptive features.
It can be instantiated for both transductive (e.g., node classification) and inductive (e.g., graph classification) tasks.
arXiv Detail & Related papers (2020-06-21T19:45:30Z) - Alleviating the Inconsistency Problem of Applying Graph Neural Network
to Fraud Detection [78.88163190021798]
We introduce a new GNN framework, $mathsfGraphConsis$, to tackle the inconsistency problem.
Empirical analysis on four datasets indicates the inconsistency problem is crucial in a fraud detection task.
We also released a GNN-based fraud detection toolbox with implementations of SOTA models.
arXiv Detail & Related papers (2020-05-01T21:43:58Z) - Disrupting Resilient Criminal Networks through Data Analysis: The case
of Sicilian Mafia [3.863757719887419]
We unveil the structure of Sicilian Mafia gangs, based on two real-world datasets.
We gain insights as to how to efficiently disrupt them.
Our work has significant practical applications for tackling criminal and terrorist networks.
arXiv Detail & Related papers (2020-03-10T12:42:59Z) - Deep Collaborative Embedding for information cascade prediction [58.90540495232209]
We propose a novel model called Deep Collaborative Embedding (DCE) for information cascade prediction.
We propose an auto-encoder based collaborative embedding framework to learn the node embeddings with cascade collaboration and node collaboration.
The results of extensive experiments conducted on real-world datasets verify the effectiveness of our approach.
arXiv Detail & Related papers (2020-01-18T13:32:18Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.