2019
DOI: 10.1109/tkde.2018.2834909
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Pickpocket Suspects from Large-Scale Public Transit Records

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(32 citation statements)
references
References 28 publications
0
32
0
Order By: Relevance
“…Several works are reported to predict next location from movement traces such as GPS log, check-in data or social network information [16], [17], [18]. There are challenging applications, namely, urban land-use classification from taxi-traces [19], categorizing users in an academic campus [20] or catching pick-pockets from large-scale transit records [21]. It is well known that human movement traces follow spatio-temporal regularity.…”
Section: Related Workmentioning
confidence: 99%
“…Several works are reported to predict next location from movement traces such as GPS log, check-in data or social network information [16], [17], [18]. There are challenging applications, namely, urban land-use classification from taxi-traces [19], categorizing users in an academic campus [20] or catching pick-pockets from large-scale transit records [21]. It is well known that human movement traces follow spatio-temporal regularity.…”
Section: Related Workmentioning
confidence: 99%
“…How to separate the noises from a dataset is a challenging problem. In data mining, researchers use the density [67][68] or distribution [69][70][71] to eliminate noises or isolated points. Furthermore, clustering [72][73] and classification algorithms [74][75] provide functions to eliminate them.…”
Section: Dhblan Coefficientmentioning
confidence: 99%
“…For instance, constant, intermittent, reactive, and adaptive jamming schemes have been proposed under different system setups, in which Gaussian noise is artificially generated as the jamming signals to interfere with the targeted receivers [1]. To efficiently disrupt the communications, these existing schemes require 4 It has been shown in [6] that in public transit systems, rough user mobility profiles collected based on passengers' large-scale transit records are useful to catch malicious users such as pickpocket suspects; while the user mobility profiles extracted from mobile data here are even more accurate. As a result, the user mobility profiling is practically feasible in suspicious user identification.…”
Section: Related Workmentioning
confidence: 99%
“…On the other hand, if the devices (such as smartphones like BlackBerry and iPhone) can automatically encrypt transmit data for users with the key pre-installed, the SIDs (managed by government agencies) can legally acquire such information from the device (such as smartphone) manufacturing company. 6 We refer interested readers to [1] for more details on higher-layer encryption and decryption.…”
Section: Proactive Eavesdropping Of Suspicious Communicationsmentioning
confidence: 99%