Privacy preserving strong simulation queries on large graphs

L Xu, J Jiang, B Choi, J Xu… - 2021 IEEE 37th …, 2021 - ieeexplore.ieee.org
This paper studies privacy preserving query services for strong simulation queries in the
database outsourcing paradigm. In such a paradigm, clients send their queries to a third …

INSiGHT: A system to detect violent extremist radicalization trajectories in dynamic graphs

BWK Hung, AP Jayasumana, VW Bandara - Data & Knowledge …, 2018 - Elsevier
The number and lethality of violent extremist plots motivated by the Salafi-jihadist ideology
have been growing for nearly the last decade in many parts of the world including both the …

A comparative study of subgraph matching isomorphic methods in social networks

T Ma, S Yu, J Cao, Y Tian, A Al-Dhelaan… - IEEE …, 2018 - ieeexplore.ieee.org
With the fast development of social networks, more and more data has been generated.
Finding useful information among these data is important. Subgraph matching is the method …

Finding emergent patterns of behaviors in dynamic heterogeneous social networks

BWK Hung, AP Jayasumana… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The search in graph databases for individuals or entities undertaking latent or emergent
behaviors has applicability in the areas of homeland security, consumer analytics …

Detecting radicalization trajectories using graph pattern matching algorithms

BWK Hung, AP Jayasumana… - 2016 IEEE Conference …, 2016 - ieeexplore.ieee.org
This paper outlines our on-going efforts to address the radicalization detection problem, the
automated or semi-automated task of dynamically detecting and tracking behavioral …

Approximate computation for big data analytics

S Ma, J Huai - ACM SIGWEB Newsletter, 2021 - dl.acm.org
Over the past a few years, research and development has made significant progresses on
big data analytics. A fundamental issue for big data analytics is the efficiency. If the optimal …

Expressive top-k matching for conditional graph patterns

H Mahfoud - Neural Computing and Applications, 2022 - Springer
We propose conditional graph patterns (CGPs) that make conventional patterns more
expressive, especially with positive and negative predicates. In emerging applications …

Investigative graph search using graph databases

SR Muramudalige, BWK Hung… - … conference on graph …, 2019 - ieeexplore.ieee.org
Identification and tracking of individuals or groups perpetrating latent or emergent behaviors
are significant in home-land security, cyber security, behavioral health, and consumer …

Automating investigative pattern detection using machine learning & graph pattern matching techniques

SR Muramudalige - 2022 - search.proquest.com
Identification and analysis of latent and emergent behavioral patterns are core tasks in
investigative domains such as homeland security, counterterrorism, and crime prevention …

INSiGHT: A system for detecting radicalization trajectories in large heterogeneous graphs

BWK Hung, AP Jayasumana… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Detecting the radicalization of violent extremists is a key component in preventing future
terrorist attacks, but it remains a significant challenge to law enforcement. Framing our …