Suspect vehicle identification for border safety with modified mutual information

Siddharth Kaza, Yuan Wang, Hsinchun Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

The Department of Homeland Security monitors vehicles entering and leaving the country at land ports of entry. Some vehicles are targeted to search for drugs and other contraband. Customs and Border Protection agents believe that vehicles involved in illegal activity operate in groups. If the criminal links of one vehicle are known then their border crossing patterns can be used to identify other partner vehicles. We perform this association analysis by using mutual information (MI) to identify pairs of vehicles that are potentially involved in criminal activity. Domain experts also suggest that criminal vehicles may cross at certain times of the day to evade inspection. We propose to modify the mutual information formulation to include this heuristic by using cross-jurisdictional criminal data from border-area jurisdictions. We find that the modified MI with time heuristics performs better than classical MI in identifying potentially criminal vehicles.

Original languageEnglish (US)
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages308-318
Number of pages11
Volume3975 LNCS
DOIs
StatePublished - 2006
EventIEEE International Conference on Intelligence and Security Informatics, ISI 2006 - San Diego, CA, United States
Duration: May 23 2006May 24 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3975 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

OtherIEEE International Conference on Intelligence and Security Informatics, ISI 2006
CountryUnited States
CitySan Diego, CA
Period5/23/065/24/06

Fingerprint

Mutual Information
Safety
Heuristics
Homeland Security
Emigration and Immigration
Inspection
Drugs
Monitor
Formulation
National security
Pharmaceutical Preparations

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Cite this

Kaza, S., Wang, Y., & Chen, H. (2006). Suspect vehicle identification for border safety with modified mutual information. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3975 LNCS, pp. 308-318). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3975 LNCS). https://doi.org/10.1007/11760146_27

Suspect vehicle identification for border safety with modified mutual information. / Kaza, Siddharth; Wang, Yuan; Chen, Hsinchun.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3975 LNCS 2006. p. 308-318 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3975 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kaza, S, Wang, Y & Chen, H 2006, Suspect vehicle identification for border safety with modified mutual information. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 3975 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3975 LNCS, pp. 308-318, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, United States, 5/23/06. https://doi.org/10.1007/11760146_27
Kaza S, Wang Y, Chen H. Suspect vehicle identification for border safety with modified mutual information. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3975 LNCS. 2006. p. 308-318. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/11760146_27
Kaza, Siddharth ; Wang, Yuan ; Chen, Hsinchun. / Suspect vehicle identification for border safety with modified mutual information. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3975 LNCS 2006. pp. 308-318 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{64407fd901ac4bc491869d18c4e710a8,
title = "Suspect vehicle identification for border safety with modified mutual information",
abstract = "The Department of Homeland Security monitors vehicles entering and leaving the country at land ports of entry. Some vehicles are targeted to search for drugs and other contraband. Customs and Border Protection agents believe that vehicles involved in illegal activity operate in groups. If the criminal links of one vehicle are known then their border crossing patterns can be used to identify other partner vehicles. We perform this association analysis by using mutual information (MI) to identify pairs of vehicles that are potentially involved in criminal activity. Domain experts also suggest that criminal vehicles may cross at certain times of the day to evade inspection. We propose to modify the mutual information formulation to include this heuristic by using cross-jurisdictional criminal data from border-area jurisdictions. We find that the modified MI with time heuristics performs better than classical MI in identifying potentially criminal vehicles.",
author = "Siddharth Kaza and Yuan Wang and Hsinchun Chen",
year = "2006",
doi = "10.1007/11760146_27",
language = "English (US)",
isbn = "3540344780",
volume = "3975 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "308--318",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - Suspect vehicle identification for border safety with modified mutual information

AU - Kaza, Siddharth

AU - Wang, Yuan

AU - Chen, Hsinchun

PY - 2006

Y1 - 2006

N2 - The Department of Homeland Security monitors vehicles entering and leaving the country at land ports of entry. Some vehicles are targeted to search for drugs and other contraband. Customs and Border Protection agents believe that vehicles involved in illegal activity operate in groups. If the criminal links of one vehicle are known then their border crossing patterns can be used to identify other partner vehicles. We perform this association analysis by using mutual information (MI) to identify pairs of vehicles that are potentially involved in criminal activity. Domain experts also suggest that criminal vehicles may cross at certain times of the day to evade inspection. We propose to modify the mutual information formulation to include this heuristic by using cross-jurisdictional criminal data from border-area jurisdictions. We find that the modified MI with time heuristics performs better than classical MI in identifying potentially criminal vehicles.

AB - The Department of Homeland Security monitors vehicles entering and leaving the country at land ports of entry. Some vehicles are targeted to search for drugs and other contraband. Customs and Border Protection agents believe that vehicles involved in illegal activity operate in groups. If the criminal links of one vehicle are known then their border crossing patterns can be used to identify other partner vehicles. We perform this association analysis by using mutual information (MI) to identify pairs of vehicles that are potentially involved in criminal activity. Domain experts also suggest that criminal vehicles may cross at certain times of the day to evade inspection. We propose to modify the mutual information formulation to include this heuristic by using cross-jurisdictional criminal data from border-area jurisdictions. We find that the modified MI with time heuristics performs better than classical MI in identifying potentially criminal vehicles.

UR - http://www.scopus.com/inward/record.url?scp=33745894323&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33745894323&partnerID=8YFLogxK

U2 - 10.1007/11760146_27

DO - 10.1007/11760146_27

M3 - Conference contribution

SN - 3540344780

SN - 9783540344780

VL - 3975 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 308

EP - 318

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -