Mining lines in the sand: On trajectory discovery from untrustworthy data in cyber-physical system

Lu An Tang, Xiao Yu, Quanquan Gu, Jiawei Han, Alice Leung, Thomas La Porta

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a context sensitive system that responds intelligently to dynamic changes in real-world situations. The CPS has wide applications in scenarios such as environment monitoring, battlefield surveillance and traffic control. One key research problem of CPS is called \mining lines in the sand". With a large number of sensors (sand) deployed in a designated area, the CPS is required to discover all the trajectories (lines) of passing intruders in real time. There are two crucial challenges that need to be addressed: (1) the collected sensor data are not trustworthy; (2) the intruders do not send out any identification information. The sys-Tem needs to distinguish multiple intruders and track their movements. In this study, we propose a method called LiSM (Line-in-The-Sand Miner) to discover trajectories from un-Trustworthy sensor data. LiSM constructs a watching net- work from sensor data and computes the locations of intruder appearances based on the link information of the network. The system retrieves a cone-model from the historical trajectories and tracks multiple intruders based on this model. Finally the system validates the mining results and updates the sensor's reliability in a feedback process. Extensive experiments on big datasets demonstrate the feasibility and applicability of the proposed methods.

Original languageEnglish (US)
Title of host publicationKDD 2013 - 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
EditorsRajesh Parekh, Jingrui He, Dhillon S. Inderjit, Paul Bradley, Yehuda Koren, Rayid Ghani, Ted E. Senator, Robert L. Grossman, Ramasamy Uthurusamy
PublisherAssociation for Computing Machinery
Pages410-418
Number of pages9
ISBN (Electronic)9781450321747
DOIs
StatePublished - Aug 11 2013
Event19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2013 - Chicago, United States
Duration: Aug 11 2013Aug 14 2013

Publication series

NameProceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
VolumePart F128815

Other

Other19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2013
CountryUnited States
CityChicago
Period8/11/138/14/13

Fingerprint

Sand
Trajectories
Sensors
Miners
Traffic control
Cyber Physical System
Cones
Feedback
Monitoring
Experiments

All Science Journal Classification (ASJC) codes

  • Software
  • Information Systems

Cite this

Tang, L. A., Yu, X., Gu, Q., Han, J., Leung, A., & La Porta, T. (2013). Mining lines in the sand: On trajectory discovery from untrustworthy data in cyber-physical system. In R. Parekh, J. He, D. S. Inderjit, P. Bradley, Y. Koren, R. Ghani, T. E. Senator, R. L. Grossman, ... R. Uthurusamy (Eds.), KDD 2013 - 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 410-418). [2487585] (Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; Vol. Part F128815). Association for Computing Machinery. https://doi.org/10.1145/2487575.2487585
Tang, Lu An ; Yu, Xiao ; Gu, Quanquan ; Han, Jiawei ; Leung, Alice ; La Porta, Thomas. / Mining lines in the sand : On trajectory discovery from untrustworthy data in cyber-physical system. KDD 2013 - 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. editor / Rajesh Parekh ; Jingrui He ; Dhillon S. Inderjit ; Paul Bradley ; Yehuda Koren ; Rayid Ghani ; Ted E. Senator ; Robert L. Grossman ; Ramasamy Uthurusamy. Association for Computing Machinery, 2013. pp. 410-418 (Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining).
@inproceedings{7b05f4cb57074051b3bed85781124d90,
title = "Mining lines in the sand: On trajectory discovery from untrustworthy data in cyber-physical system",
abstract = "A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a context sensitive system that responds intelligently to dynamic changes in real-world situations. The CPS has wide applications in scenarios such as environment monitoring, battlefield surveillance and traffic control. One key research problem of CPS is called \mining lines in the sand{"}. With a large number of sensors (sand) deployed in a designated area, the CPS is required to discover all the trajectories (lines) of passing intruders in real time. There are two crucial challenges that need to be addressed: (1) the collected sensor data are not trustworthy; (2) the intruders do not send out any identification information. The sys-Tem needs to distinguish multiple intruders and track their movements. In this study, we propose a method called LiSM (Line-in-The-Sand Miner) to discover trajectories from un-Trustworthy sensor data. LiSM constructs a watching net- work from sensor data and computes the locations of intruder appearances based on the link information of the network. The system retrieves a cone-model from the historical trajectories and tracks multiple intruders based on this model. Finally the system validates the mining results and updates the sensor's reliability in a feedback process. Extensive experiments on big datasets demonstrate the feasibility and applicability of the proposed methods.",
author = "Tang, {Lu An} and Xiao Yu and Quanquan Gu and Jiawei Han and Alice Leung and {La Porta}, Thomas",
year = "2013",
month = "8",
day = "11",
doi = "10.1145/2487575.2487585",
language = "English (US)",
series = "Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining",
publisher = "Association for Computing Machinery",
pages = "410--418",
editor = "Rajesh Parekh and Jingrui He and Inderjit, {Dhillon S.} and Paul Bradley and Yehuda Koren and Rayid Ghani and Senator, {Ted E.} and Grossman, {Robert L.} and Ramasamy Uthurusamy",
booktitle = "KDD 2013 - 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining",

}

Tang, LA, Yu, X, Gu, Q, Han, J, Leung, A & La Porta, T 2013, Mining lines in the sand: On trajectory discovery from untrustworthy data in cyber-physical system. in R Parekh, J He, DS Inderjit, P Bradley, Y Koren, R Ghani, TE Senator, RL Grossman & R Uthurusamy (eds), KDD 2013 - 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining., 2487585, Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, vol. Part F128815, Association for Computing Machinery, pp. 410-418, 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2013, Chicago, United States, 8/11/13. https://doi.org/10.1145/2487575.2487585

Mining lines in the sand : On trajectory discovery from untrustworthy data in cyber-physical system. / Tang, Lu An; Yu, Xiao; Gu, Quanquan; Han, Jiawei; Leung, Alice; La Porta, Thomas.

KDD 2013 - 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ed. / Rajesh Parekh; Jingrui He; Dhillon S. Inderjit; Paul Bradley; Yehuda Koren; Rayid Ghani; Ted E. Senator; Robert L. Grossman; Ramasamy Uthurusamy. Association for Computing Machinery, 2013. p. 410-418 2487585 (Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; Vol. Part F128815).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Mining lines in the sand

T2 - On trajectory discovery from untrustworthy data in cyber-physical system

AU - Tang, Lu An

AU - Yu, Xiao

AU - Gu, Quanquan

AU - Han, Jiawei

AU - Leung, Alice

AU - La Porta, Thomas

PY - 2013/8/11

Y1 - 2013/8/11

N2 - A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a context sensitive system that responds intelligently to dynamic changes in real-world situations. The CPS has wide applications in scenarios such as environment monitoring, battlefield surveillance and traffic control. One key research problem of CPS is called \mining lines in the sand". With a large number of sensors (sand) deployed in a designated area, the CPS is required to discover all the trajectories (lines) of passing intruders in real time. There are two crucial challenges that need to be addressed: (1) the collected sensor data are not trustworthy; (2) the intruders do not send out any identification information. The sys-Tem needs to distinguish multiple intruders and track their movements. In this study, we propose a method called LiSM (Line-in-The-Sand Miner) to discover trajectories from un-Trustworthy sensor data. LiSM constructs a watching net- work from sensor data and computes the locations of intruder appearances based on the link information of the network. The system retrieves a cone-model from the historical trajectories and tracks multiple intruders based on this model. Finally the system validates the mining results and updates the sensor's reliability in a feedback process. Extensive experiments on big datasets demonstrate the feasibility and applicability of the proposed methods.

AB - A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a context sensitive system that responds intelligently to dynamic changes in real-world situations. The CPS has wide applications in scenarios such as environment monitoring, battlefield surveillance and traffic control. One key research problem of CPS is called \mining lines in the sand". With a large number of sensors (sand) deployed in a designated area, the CPS is required to discover all the trajectories (lines) of passing intruders in real time. There are two crucial challenges that need to be addressed: (1) the collected sensor data are not trustworthy; (2) the intruders do not send out any identification information. The sys-Tem needs to distinguish multiple intruders and track their movements. In this study, we propose a method called LiSM (Line-in-The-Sand Miner) to discover trajectories from un-Trustworthy sensor data. LiSM constructs a watching net- work from sensor data and computes the locations of intruder appearances based on the link information of the network. The system retrieves a cone-model from the historical trajectories and tracks multiple intruders based on this model. Finally the system validates the mining results and updates the sensor's reliability in a feedback process. Extensive experiments on big datasets demonstrate the feasibility and applicability of the proposed methods.

UR - http://www.scopus.com/inward/record.url?scp=85014234481&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85014234481&partnerID=8YFLogxK

U2 - 10.1145/2487575.2487585

DO - 10.1145/2487575.2487585

M3 - Conference contribution

AN - SCOPUS:85014234481

T3 - Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining

SP - 410

EP - 418

BT - KDD 2013 - 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining

A2 - Parekh, Rajesh

A2 - He, Jingrui

A2 - Inderjit, Dhillon S.

A2 - Bradley, Paul

A2 - Koren, Yehuda

A2 - Ghani, Rayid

A2 - Senator, Ted E.

A2 - Grossman, Robert L.

A2 - Uthurusamy, Ramasamy

PB - Association for Computing Machinery

ER -

Tang LA, Yu X, Gu Q, Han J, Leung A, La Porta T. Mining lines in the sand: On trajectory discovery from untrustworthy data in cyber-physical system. In Parekh R, He J, Inderjit DS, Bradley P, Koren Y, Ghani R, Senator TE, Grossman RL, Uthurusamy R, editors, KDD 2013 - 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Association for Computing Machinery. 2013. p. 410-418. 2487585. (Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining). https://doi.org/10.1145/2487575.2487585