Link Prediction Based on Sequential Bayesian Updating in a Terrorist Network

Link prediction techniques are being increasingly employed to detect covert networks, such as terrorist networks. The challenging problem we have been facing is to improve the performance and accuracy of link prediction methods. We develop an algorithm based on Sequential Bayesian Updating method that combines probabilistic reasoning techniques. This algorithm adopts a recursive way to estimate the statistical confidence of the results a prior and then regenerate observed graphs to make inferences. This novel idea can be efficiently adapt to small datasets in link prediction problems of various engineering applications and science researches. Our experiment with a terrorist network shows significant improvement in terms of prediction accuracy measured by mean average precision. This algorithm has also been integrated into an emergency decision support system (NBCDSS) to provide decision-makers’ auxiliary information.

[1]  Philip Resnik,et al.  Using Information Content to Evaluate Semantic Similarity in a Taxonomy , 1995, IJCAI.

[2]  Christopher J. Rhodes,et al.  Inference Approaches to Constructing Covert Social Network Topologies , 2009 .

[3]  Jure Leskovec,et al.  Supervised random walks: predicting and recommending links in social networks , 2010, WSDM '11.

[4]  M. Newman,et al.  Hierarchical structure and the prediction of missing links in networks , 2008, Nature.

[5]  Wei Chu,et al.  Stochastic Relational Models for Discriminative Link Prediction , 2006, NIPS.

[6]  Michael McGill,et al.  Introduction to Modern Information Retrieval , 1983 .

[7]  Ricardo Baeza-Yates,et al.  Information Retrieval: Data Structures and Algorithms , 1992 .

[8]  Sophie Ahrens,et al.  Recommender Systems , 2012 .

[9]  M Girvan,et al.  Structure of growing social networks. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.

[10]  Jure Leskovec,et al.  Multiplicative Attribute Graph Model of Real-World Networks , 2010, Internet Math..

[11]  Christos Faloutsos,et al.  Kronecker Graphs: An Approach to Modeling Networks , 2008, J. Mach. Learn. Res..

[12]  Uffe Kock Wiil Counterterrorism and Open Source Intelligence , 2011, Counterterrorism and Open Source Intelligence.

[13]  M. Gerstein,et al.  A Bayesian Networks Approach for Predicting Protein-Protein Interactions from Genomic Data , 2003, Science.

[14]  Donald Hindle,et al.  Noun Classification From Predicate-Argument Structures , 1990, ACL.

[15]  C. J. Rhodes,et al.  Social network topology: a Bayesian approach , 2007, J. Oper. Res. Soc..

[16]  Hans-Peter Kriegel,et al.  Dirichlet enhanced relational learning , 2005, ICML.

[17]  A. Barabasi,et al.  High-Quality Binary Protein Interaction Map of the Yeast Interactome Network , 2008, Science.

[18]  Jure Leskovec,et al.  The Network Completion Problem: Inferring Missing Nodes and Edges in Networks , 2011, SDM.

[19]  Christopher J. Rhodes,et al.  The Use of Open Source Intelligence in the Construction of Covert Social Networks , 2011, Counterterrorism and Open Source Intelligence.

[20]  Lada A. Adamic,et al.  Friends and neighbors on the Web , 2003, Soc. Networks.