2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2012
DOI: 10.1109/icassp.2012.6288778
|View full text |Cite
|
Sign up to set email alerts
|

Harmonic space-time threat propagation for graph detection

Abstract: This paper addresses threat propagation on space-time graphs, defined to be a time-sampled graph. The application considered is geographical sites connected by tracks, though such graphs arise in many fields. Several new concepts and efficient algorithms are introduced, specifically, the space-time adjacency matrix and harmonic threat propagation. The cued threat propagation problem is shown to be equivalent to the harmonic solution to Laplace's equation on the graph. Alternately, the Perron-Frobenius theorem … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(11 citation statements)
references
References 10 publications
0
11
0
Order By: Relevance
“…The smallest (i.e., most negative) value is then used as a test statistic, since we are interested in cases where the norm is small. The test statistic is given by (16) An example demonstrating this method is provided in Fig. 3.…”
Section: B Eigenvector Normsmentioning
confidence: 99%
See 1 more Smart Citation
“…The smallest (i.e., most negative) value is then used as a test statistic, since we are interested in cases where the norm is small. The test statistic is given by (16) An example demonstrating this method is provided in Fig. 3.…”
Section: B Eigenvector Normsmentioning
confidence: 99%
“…Other work assumes common substructures over the graph, and detects anomalies based on deviations from the "normative pattern" via methods such as minimum description length [14] or analysis of the graph Laplacian [15]. Techniques such as threat propagation [16], [17] and vertex nomination [18] consider a cue vertex as a knowledge prior, giving an initial indication of which vertices are of interest, the objective then being to find the remainder of the subgraph. Community detection in graphs is a widely studied related problem [19], where the communities in the graph are sometimes cast as deviations from a null hypothesis in which the graph has no community structure [20].…”
Section: Introductionmentioning
confidence: 99%
“…In future work, we will analyze different edge weighting functions [11] and see how our method fits with noniterative solutions [13]. Finally, we will apply PTP towards non-malicious communities, propagating 'trust' as an example, or even multiple communities of interest.…”
Section: Discussionmentioning
confidence: 99%
“…Recent methods [11,12,13] take an iterative approach in which 'threat' is initialized at the tip nodes and iteratively propagated throughout the graph. These methods have proven promising, yet suffer from what we deem as direct feedback, in which a node's threat level can increase solely based on the threat it had previously propagated to neighbors.…”
Section: Introductionmentioning
confidence: 99%
“…Space-Time threat propagation is used compute the time-varying threat across a graph given one or more observations at specific vertices and times [48], [57]. In such scenarios, the time-stamped graph may be viewed as a space-time graph where is the set of sample times and is an edge set determined by the temporal correlations between vertices at specific times.…”
Section: B Space-time Threat Propagationmentioning
confidence: 99%