Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Exploring the Risky Travel Area and Behavior of Car-hailing Service

Published: 23 December 2021 Publication History

Abstract

Recent years have witnessed the rapid development of car-hailing services, which provide a convenient approach for connecting passengers and local drivers using their personal vehicles. At the same time, the concern on passenger safety has gradually emerged and attracted more and more attention. While car-hailing service providers have made considerable efforts on developing real-time trajectory tracking systems and alarm mechanisms, most of them only focus on providing rescue-supporting information rather than preventing potential crimes. Recently, the newly available large-scale car-hailing order data have provided an unparalleled chance for researchers to explore the risky travel area and behavior of car-hailing services, which can be used for building an intelligent crime early warning system. To this end, in this article, we propose a Risky Area and Risky Behavior Evaluation System (RARBEs) based on the real-world car-hailing order data. In RARBEs, we first mine massive multi-source urban data and train an effective area risk prediction model, which estimates area risk at the urban block level. Then, we propose a transverse and longitudinal double detection method, which estimates behavior risk based on two aspects, including fraud trajectory recognition and fraud patterns mining. In particular, we creatively propose a bipartite graph-based algorithm to model the implicit relationship between areas and behaviors, which collaboratively adjusts area risk and behavior risk estimation based on random walk regularization. Finally, extensive experiments on multi-source real-world urban data clearly validate the effectiveness and efficiency of our system.

References

[1]
Naoki Abe, Bianca Zadrozny, and John Langford. 2006. Outlier detection by active learning. In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 504–509.
[2]
Asma Belhadi, Youcef Djenouri, Jerry Chun-Wei Lin, and Alberto Cano. 2020. Trajectory outlier detection: Algorithms, taxonomies, evaluation, and open challenges. ACM Trans. Manag. Inf. Syst. 11, 3 (June 2020). DOI:https://doi.org/10.1145/3399631
[3]
Jon Louis Bentley. 1975. Multidimensional binary search trees used for associative searching. Commun. ACM 18, 9 (Sept. 1975), 509–517. DOI:https://doi.org/10.1145/361002.361007
[4]
Vania Bogorny, Bart Kuijpers, and Luis Otavio Alvares. 2009. ST-DMQL: A semantic trajectory data mining query language. Int. J. Geog. Inf. Sci. 23, 10 (2009), 1245–1276.
[5]
Christian Böhm, Katrin Haegler, Nikola S. Müller, and Claudia Plant. 2009. CoCo: Coding cost for parameter-free outlier detection. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 149–158.
[6]
Leo Breiman. 2001. Random forests. Mach. Learn. 45, 1 (2001), 5–32.
[7]
Yingyi Bu, Lei Chen, Ada Wai-Chee Fu, and Dawei Liu. 2009. Efficient anomaly monitoring over moving object trajectory streams. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 159–168.
[8]
Francesco Calabrese, Giusy Di Lorenzo, Liang Liu, and Carlo Ratti. 2011. Estimating origin-destination flows using opportunistically collected mobile phone location data. IEEE Pervasive Computing 10, 4 (2011), 36–44. DOI:https://doi.org/10.1109/MPRV.2011.41
[9]
V. Chandola, A. Banerjee, and V. Kumar. 2009. Anomaly detection: A survey. Comput. Surv. 41, 3 (2009).
[10]
Chen Chao, Daqing Zhang, Pablo Samuel Castro, Li Nan, Sun Lin, Shijian Li, and Zonghui Wang. 2013. iBOAT: Isolation-based online anomalous trajectory detection. IEEE Trans. Intell. Transport. Syst. 14, 2 (2013), 806–818.
[11]
Zhenxing Chen, Bo Liu, Meiqing Wang, Peng Dai, Jun Lv, and Liefeng Bo. 2020. Generative Adversarial Attributed Network Anomaly Detection. Association for Computing Machinery, New York, NY, 1989–1992. DOI:https://doi.org/10.1145/3340531.3412070
[12]
B. Cheng, S. Qian, J. Cao, G. Xue, and T. Zhang. 2019. STL: Online Detection of Taxi Trajectory Anomaly Based on Spatial-temporal Laws. Database Systems for Advanced Applications.
[13]
Bowen Du, Chuanren Liu, Wenjun Zhou, Zhenshan Hou, and Xiong Hui. 2018. Detecting pickpocket suspects from large-scale public transit records. IEEE Trans. Knowl. Data Eng. PP, 99 (2018), 1–1.
[14]
Jie Feng, Zeyu Yang, Fengli Xu, Haisu Yu, Mudan Wang, and Yong Li. 2020. Learning to simulate human mobility. In Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’20). Association for Computing Machinery, New York, NY, 3426–3433. DOI:https://doi.org/10.1145/3394486.3412862
[15]
Jie Feng, Zeyu Yang, Fengli Xu, Haisu Yu, Mudan Wang, and Yong Li. 2020. Learning to simulate human mobility. In Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’20). Association for Computing Machinery, New York, NY, 3426–3433. DOI:https://doi.org/10.1145/3394486.3412862
[16]
Jerome H. Friedman. 2002. Stochastic gradient boosting. Comput. Statist. Data Anal. 38, 4 (2002), 367–378.
[17]
Jon Froehlich and John Krumm. 2008. Route Prediction from Trip Observations. Technical Report. SAE Technical Paper.
[18]
Yong Ge, Hui Xiong, Chuanren Liu, and Zhi Hua Zhou. 2012. A taxi driving fraud detection system. In Proceedings of the IEEE International Conference on Data Mining.
[19]
Yong Ge, Hui Xiong, Zhi-hua Zhou, Hasan Ozdemir, Jannite Yu, and Kuo Chu Lee. 2010. Top-eye: Top-k evolving trajectory outlier detection. In Proceedings of the 19th ACM International Conference on Information and Knowledge Management. ACM, 1733–1736.
[20]
Marta C. Gonzalez, Cesar A. Hidalgo, and Albert-Laszlo Barabasi. 2008. Understanding individual human mobility patterns. Nature 453, 7196 (2008), 779.
[21]
Liang Hong, Yu Zheng, Duncan Yung, Jingbo Shang, and Lei Zou. 2015. Detecting urban black holes based on human mobility data. In Proceedings of the 23rd SIGSPATIAL International Conference on Advances in Geographic Information Systems. ACM, 35.
[22]
CCTV13 Legal Channel Report. 2018. Didi in the past 4 years: at least 50 cases, 53 victims are all women. https://baijiahao.baidu.com/s?id=1610209474102135925&wfr=spider&for=pc.
[23]
New York City Police Department. 2016. New York city crime map supported by the New York police department. https://maps.nyc.gov/crime/.
[24]
Crime spot in Berkeley. 2019. Crime map of the area around Berkeley. https://www.spotcrime.com.
[25]
Real estate service in San Francisco. 2018. A crime map from online real estate service Trulia. https://www.trulia.com/local/.
[26]
Jizhou Huang, Haifeng Wang, Miao Fan, An Zhuo, Yibo Sun, and Ying Li. 2020. Understanding the impact of the COVID-19 pandemic on transportation-related behaviors with human mobility data. In Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’20). Association for Computing Machinery, New York, NY, 3443–3450. DOI:https://doi.org/10.1145/3394486.3412856
[27]
JeromeFriedman, TrevorHastie, and RobTibshirani. 2010. Regularization paths for generalized linear models via coordinate descent. J. Statist. Softw. 33, 1 (2010), 1–22.
[28]
Hans-Peter Kriegel, Arthur Zimek, et al. 2008. Angle-based outlier detection in high-dimensional data. In Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 444–452.
[29]
John Krumm and Eric Horvitz. 2006. Predestination: Inferring destinations from partial trajectories. In Proceedings of the International Conference on Ubiquitous Computing. Springer, 243–260.
[30]
Avishek Kumar, Syed Ali Asad Rizvi, Benjamin Brooks, R. Ali Vanderveld, Kevin H. Wilson, Chad Kenney, Sam Edelstein, Adria Finch, Andrew Maxwell, Joe Zuckerbraun, et al. 2018. Using machine learning to assess the risk of and prevent water main breaks. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 472–480.
[31]
Jae-Gil Lee, Jiawei Han, and Xiaolei Li. 2008. Trajectory outlier detection: A partition-and-detect framework. In Proceedings of the IEEE 24th International Conference on Data Engineering. IEEE, 140–149.
[32]
Xiaolei Li, Zhenhui Li, Jiawei Han, and Jae-Gil Lee. 2009. Temporal outlier detection in vehicle traffic data. In Proceedings of the IEEE 25th International Conference on Data Engineering. IEEE, 1319–1322.
[33]
Lin Liao, Donald J. Patterson, Dieter Fox, and Henry Kautz. 2007. Learning and inferring transportation routines. Artif. Intell. 171, 5-6 (2007), 311–331.
[34]
Fei Tony Liu, Kai Ming Ting, and Zhi-Hua Zhou. 2008. Isolation forest. In Proceedings of the 8th IEEE International Conference on Data Mining. IEEE, 413–422.
[35]
Siyuan Liu, Lionel M. Ni, and Ramayya Krishnan. 2013. Fraud detection from taxis’ driving behaviors. IEEE Trans. Vehic. Technol. 63, 1 (2013), 464–472.
[36]
Wei Liu, Yu Zheng, Sanjay Chawla, Jing Yuan, and Xie Xing. 2011. Discovering spatio-temporal causal interactions in traffic data streams. In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 1010–1018.
[37]
Yanchi Liu, Chuanren Liu, Xinjiang Lu, Mingfei Teng, Hengshu Zhu, and Xiong Hui. 2017. Point-of-Interest demand modeling with human mobility patterns. In ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.
[38]
Yanchi Liu, Chuanren Liu, Nicholas Jing Yuan, Lian Duan, Yanjie Fu, Hui Xiong, Songhua Xu, and Junjie Wu. 2014. Exploiting heterogeneous human mobility patterns for intelligent bus routing. In Proceedings of the IEEE International Conference on Data Mining. 360–369.
[39]
Mingqi Lv, Ling Chen, Zhenxing Xu, Yinglong Li, and Gencai Chen. 2016. The discovery of personally semantic places based on trajectory data mining. Neurocomputing 173 (2016), 1142–1153.
[40]
Bei Pan, Yu Zheng, David Wilkie, and Cyrus Shahabi. 2013. Crowd sensing of traffic anomalies based on human mobility and social media. In Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems. ACM, 344–353.
[41]
G. Pang, C. Shen, L. Cao, and Avd Hengel. 2021. Deep learning for anomaly detection. ACM Computing Surveys (CSUR) 54 (2021), 1–38.
[42]
Guansong Pang, Chunhua Shen, and Anton van den Hengel. 2019. Deep anomaly detection with deviation networks. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’19). Association for Computing Machinery, New York, NY, 353–362. DOI:https://doi.org/10.1145/3292500.3330871
[43]
Donald J. Patterson, Lin Liao, Dieter Fox, and Henry Kautz. 2003. Inferring high-level behavior from low-level sensors. In Proceedings of the International Conference on Ubiquitous Computing. Springer, 73–89.
[44]
F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay. 2011. Scikit-learn: Machine learning in Python. J. Mach. Learn. Res. 12 (2011), 2825–2830.
[45]
Guande Qi, Xiaolong Li, Shijian Li, Gang Pan, Zonghui Wang, and Daqing Zhang. 2011. Measuring social functions of city regions from large-scale taxi behaviors. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). IEEE, 384–388.
[46]
R. M. Rifkin and R. A. Lippert. 2007. Notes on Regularized Least Squares. Technical Report MIT-CSAILTR-2007-025. Computer Science and Artificial Intelligence Laboratory. MIT.
[47]
M. Schmidt, N. L. Roux, and F. Bach. 2013. Minimizing finite sums with the stochastic average gradient. Technical Report HAL 00860051. INRIA, Paris, France.
[48]
Johan A. K. Suykens and Joos Vandewalle. 1999. Least squares support vector machine classifiers. Neural Process. Lett. 9, 3 (1999), 293–300.
[49]
Ruoying Wang, Kexin Nie, Yen-Jung Chang, Xinwei Gong, Tie Wang, Yang Yang, and Bo Long. 2020. Deep learning for anomaly detection. In Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’20). Association for Computing Machinery, New York, NY, 35693570. DOI:https://doi.org/10.1145/3394486.3406481
[50]
Mingxi Wu, Xiuyao Song, Chris Jermaine, Sanjay Ranka, and John Gums. 2009. A LRT framework for fast spatial anomaly detection. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 887–896.
[51]
Jing Yuan, Yu Zheng, and Xing Xie. 2012. Discovering regions of different functions in a city using human mobility and POIs. In ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.
[52]
Jing Yuan, Yu Zheng, Chengyang Zhang, Wenlei Xie, Xing Xie, Guangzhong Sun, and Yan Huang. 2010. T-drive: Driving directions based on taxi trajectories. In Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems. ACM, 99–108.
[53]
Daqing Zhang, Li Nan, Zhi Hua Zhou, Chen Chao, Sun Lin, and Shijian Li. 2011. iBAT: Detecting anomalous taxi trajectories from GPS traces. In Proceedings of the International Conference on Ubiquitous Computing.
[54]
Ya-Lin Zhang, Longfei Li, Jun Zhou, Xiaolong Li, and Zhi-Hua Zhou. 2018. Anomaly detection with partially observed anomalies. In Proceedings of the Web Conference. 639–646. DOI:https://doi.org/10.1145/3184558.3186580
[55]
Yu Zheng, Lizhu Zhang, Xing Xie, and Wei-Ying Ma. 2009. Mining interesting locations and travel sequences from GPS trajectories. In Proceedings of the 18th International Conference on World Wide Web. ACM, 791–800.
[56]
Hengshu Zhu, Hui Xiong, Yong Ge, and Enhong Chen. 2014. Discovery of ranking fraud for mobile apps. IEEE Trans. Knowl. Data Eng. 27, 1 (2014), 74–87.
[57]
Hengshu Zhu, Hui Xiong, Yong Ge, and Enhong Chen. 2014. Mobile app recommendations with security and privacy awareness. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 951–960.
[58]
Brian D. Ziebart, Andrew L. Maas, Anind K. Dey, and J. Andrew Bagnell. 2008. Navigate like a cabbie: Probabilistic reasoning from observed context-aware behavior. In Proceedings of the 10th International Conference on Ubiquitous Computing. ACM, 322–331.

Cited By

View all
  • (2022)Exploring the tidal effect of urban business district with large-scale human mobility dataFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-022-1623-617:3Online publication date: 12-Sep-2022

Index Terms

  1. Exploring the Risky Travel Area and Behavior of Car-hailing Service

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Intelligent Systems and Technology
    ACM Transactions on Intelligent Systems and Technology  Volume 13, Issue 1
    February 2022
    349 pages
    ISSN:2157-6904
    EISSN:2157-6912
    DOI:10.1145/3502429
    • Editor:
    • Huan Liu
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 23 December 2021
    Accepted: 01 May 2021
    Revised: 01 April 2021
    Received: 01 January 2021
    Published in TIST Volume 13, Issue 1

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Risk analysis
    2. fraud detection
    3. bipartite graph optimization
    4. order sequence syndrome
    5. anomaly detection

    Qualifiers

    • Research-article
    • Refereed

    Funding Sources

    • State Key Laboratory of Software Development Environment

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)60
    • Downloads (Last 6 weeks)8
    Reflects downloads up to 12 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Exploring the tidal effect of urban business district with large-scale human mobility dataFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-022-1623-617:3Online publication date: 12-Sep-2022

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media