@inproceedings{64407fd901ac4bc491869d18c4e710a8,
title = "Suspect vehicle identification for border safety with modified mutual information",
abstract = "The Department of Homeland Security monitors vehicles entering and leaving the country at land ports of entry. Some vehicles are targeted to search for drugs and other contraband. Customs and Border Protection agents believe that vehicles involved in illegal activity operate in groups. If the criminal links of one vehicle are known then their border crossing patterns can be used to identify other partner vehicles. We perform this association analysis by using mutual information (MI) to identify pairs of vehicles that are potentially involved in criminal activity. Domain experts also suggest that criminal vehicles may cross at certain times of the day to evade inspection. We propose to modify the mutual information formulation to include this heuristic by using cross-jurisdictional criminal data from border-area jurisdictions. We find that the modified MI with time heuristics performs better than classical MI in identifying potentially criminal vehicles.",
author = "Siddharth Kaza and Yuan Wang and Hsinchun Chen",
year = "2006",
doi = "10.1007/11760146_27",
language = "English (US)",
isbn = "3540344780",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer-Verlag",
pages = "308--318",
booktitle = "Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings",
note = "IEEE International Conference on Intelligence and Security Informatics, ISI 2006 ; Conference date: 23-05-2006 Through 24-05-2006",
}