• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于特征组合和带自注意力机制的双向门控循环单元的恐怖主义组织预测

Terrorism group prediction using feature combination and BiGRU with self-attention mechanism.

作者信息

Abdalsalam Mohammed, Li Chunlin, Dahou Abdelghani, Kryvinska Natalia

机构信息

School of Computer Science and Artificial Intelligence, Wuhan University of Technology, Wuhan, Hubei, China.

School of Computer Science and Information Technology, Sudan University of Science and Technology, Khartoum, Khartoum, Sudan.

出版信息

PeerJ Comput Sci. 2024 Sep 20;10:e2252. doi: 10.7717/peerj-cs.2252. eCollection 2024.

DOI:10.7717/peerj-cs.2252
PMID:39314736
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11419613/
Abstract

The world faces the ongoing challenge of terrorism and extremism, which threaten the stability of nations, the security of their citizens, and the integrity of political, economic, and social systems. Given the complexity and multifaceted nature of this phenomenon, combating it requires a collective effort, with tailored methods to address its various aspects. Identifying the terrorist organization responsible for an attack is a critical step in combating terrorism. Historical data plays a pivotal role in this process, providing insights that can inform prevention and response strategies. With advancements in technology and artificial intelligence (AI), particularly in military applications, there is growing interest in utilizing these developments to enhance national and regional security against terrorism. Central to this effort are terrorism databases, which serve as rich resources for data on armed organizations, extremist entities, and terrorist incidents. The Global Terrorism Database (GTD) stands out as one of the most widely used and accessible resources for researchers. Recent progress in machine learning (ML), deep learning (DL), and natural language processing (NLP) offers promising avenues for improving the identification and classification of terrorist organizations. This study introduces a framework designed to classify and predict terrorist groups using bidirectional recurrent units and self-attention mechanisms, referred to as BiGRU-SA. This approach utilizes the comprehensive data in the GTD by integrating textual features extracted by DistilBERT with features that show a high correlation with terrorist organizations. Additionally, the Synthetic Minority Over-sampling Technique with Tomek links (SMOTE-T) was employed to address data imbalance and enhance the robustness of our predictions. The BiGRU-SA model captures temporal dependencies and contextual information within the data. By processing data sequences in both forward and reverse directions, BiGRU-SA offers a comprehensive view of the temporal dynamics, significantly enhancing classification accuracy. To evaluate the effectiveness of our framework, we compared ten models, including six traditional ML models and four DL algorithms. The proposed BiGRU-SA framework demonstrated outstanding performance in classifying 36 terrorist organizations responsible for terrorist attacks, achieving an accuracy of 98.68%, precision of 96.06%, sensitivity of 96.83%, specificity of 99.50%, and a Matthews correlation coefficient of 97.50%. Compared to state-of-the-art methods, the proposed model outperformed others, confirming its effectiveness and accuracy in the classification and prediction of terrorist organizations.

摘要

世界面临着恐怖主义和极端主义这一持续的挑战,它们威胁着国家的稳定、公民的安全以及政治、经济和社会体系的完整性。鉴于这一现象的复杂性和多面性,打击它需要集体努力,并采用量身定制的方法来应对其各个方面。确定对袭击负责的恐怖组织是打击恐怖主义的关键一步。历史数据在这一过程中起着关键作用,提供的见解可为预防和应对策略提供参考。随着技术和人工智能(AI)的进步,特别是在军事应用方面,人们越来越有兴趣利用这些发展来加强国家和地区反恐安全。这项工作的核心是恐怖主义数据库,它是有关武装组织、极端主义实体和恐怖事件数据的丰富资源。全球恐怖主义数据库(GTD)是研究人员使用最广泛且最易获取的资源之一。机器学习(ML)、深度学习(DL)和自然语言处理(NLP)方面的最新进展为改进恐怖组织的识别和分类提供了有前景的途径。本研究引入了一个旨在使用双向循环单元和自注意力机制对恐怖组织进行分类和预测的框架,称为BiGRU-SA。这种方法通过将DistilBERT提取的文本特征与与恐怖组织高度相关的特征相结合,利用了GTD中的全面数据。此外,采用带托梅克链接的合成少数过采样技术(SMOTE-T)来解决数据不平衡问题,并提高我们预测的稳健性。BiGRU-SA模型捕捉数据中的时间依赖性和上下文信息。通过向前和向后处理数据序列,BiGRU-SA提供了时间动态的全面视图,显著提高了分类准确率。为了评估我们框架的有效性,我们比较了十个模型,包括六个传统ML模型和四个DL算法。所提出的BiGRU-SA框架在对36个对恐怖袭击负责的恐怖组织进行分类时表现出色,准确率达到98.68%,精确率为96.06%,灵敏度为96.83%,特异性为99.50%,马修斯相关系数为97.50%。与现有最先进的方法相比,所提出的模型表现优于其他模型,证实了其在恐怖组织分类和预测中的有效性和准确性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/3b83abea7b22/peerj-cs-10-2252-g018.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/224aea529432/peerj-cs-10-2252-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/0b69e93597f0/peerj-cs-10-2252-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/5c67321e24a4/peerj-cs-10-2252-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/faf081ba8903/peerj-cs-10-2252-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/117ff8d68e28/peerj-cs-10-2252-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/6fc70dc6493d/peerj-cs-10-2252-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/6cd9e2e23559/peerj-cs-10-2252-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/a6608317a1c5/peerj-cs-10-2252-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/d63f99867ee3/peerj-cs-10-2252-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/91a6de3b4c59/peerj-cs-10-2252-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/933334fc1b13/peerj-cs-10-2252-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/487ac1aa985b/peerj-cs-10-2252-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/49b702f157f3/peerj-cs-10-2252-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/245155368474/peerj-cs-10-2252-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/49864ca6f149/peerj-cs-10-2252-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/7def74f89e85/peerj-cs-10-2252-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/c42e97bce47d/peerj-cs-10-2252-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/3b83abea7b22/peerj-cs-10-2252-g018.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/224aea529432/peerj-cs-10-2252-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/0b69e93597f0/peerj-cs-10-2252-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/5c67321e24a4/peerj-cs-10-2252-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/faf081ba8903/peerj-cs-10-2252-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/117ff8d68e28/peerj-cs-10-2252-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/6fc70dc6493d/peerj-cs-10-2252-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/6cd9e2e23559/peerj-cs-10-2252-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/a6608317a1c5/peerj-cs-10-2252-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/d63f99867ee3/peerj-cs-10-2252-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/91a6de3b4c59/peerj-cs-10-2252-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/933334fc1b13/peerj-cs-10-2252-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/487ac1aa985b/peerj-cs-10-2252-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/49b702f157f3/peerj-cs-10-2252-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/245155368474/peerj-cs-10-2252-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/49864ca6f149/peerj-cs-10-2252-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/7def74f89e85/peerj-cs-10-2252-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/c42e97bce47d/peerj-cs-10-2252-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79a0/11419613/3b83abea7b22/peerj-cs-10-2252-g018.jpg

相似文献

1
Terrorism group prediction using feature combination and BiGRU with self-attention mechanism.基于特征组合和带自注意力机制的双向门控循环单元的恐怖主义组织预测
PeerJ Comput Sci. 2024 Sep 20;10:e2252. doi: 10.7717/peerj-cs.2252. eCollection 2024.
2
An Epidemiological Analysis of Terrorist Attacks in the Nordic and Baltic Countries from 1970 through 2020.《1970 年至 2020 年北欧和波罗的海国家恐怖袭击的流行病学分析》。
Prehosp Disaster Med. 2023 Jun;38(3):401-408. doi: 10.1017/S1049023X23005794. Epub 2023 Jun 2.
3
Terrorist Attacks against Hospitals: World-Wide Trends and Attack Types.恐怖袭击医院:全球趋势和袭击类型。
Prehosp Disaster Med. 2022 Feb;37(1):25-32. doi: 10.1017/S1049023X22000012. Epub 2022 Jan 18.
4
The Rising Threat of Terrorist Attacks Against Hospitals.恐怖袭击医院的威胁日益严重。
Prehosp Disaster Med. 2022 Apr;37(2):223-229. doi: 10.1017/S1049023X22000413.
5
Terrorist attacks in Iran: A counter-terrorism medicine analysis.伊朗的恐怖袭击:反恐医学分析。
Am J Disaster Med. 2024;19(2):161-174. doi: 10.5055/ajdm.0464.
6
50 Years of Mass-Fatality Terrorist Attacks: A Retrospective Study of Target Demographics, Modalities, and Injury Patterns to Better Inform Future Counter-Terrorism Medicine Preparedness and Response.50 年大规模伤亡恐怖袭击事件回顾:目标人群特征、方式和伤害模式的研究,以便更好地为未来反恐医学准备和应对提供信息。
Prehosp Disaster Med. 2021 Oct;36(5):531-535. doi: 10.1017/S1049023X21000819. Epub 2021 Aug 9.
7
Terrorist Attacks against Concerts and Festivals: A Review of 146 Incidents in the Global Terrorism Database.针对音乐会和节日活动的恐怖袭击:全球恐怖主义数据库中146起事件的综述
Prehosp Disaster Med. 2023 Feb;38(1):33-40. doi: 10.1017/S1049023X22002382. Epub 2022 Dec 21.
8
Terrorists Use of Ambulances for Terror Attacks: A Review.恐怖分子利用救护车实施恐怖袭击:综述
Prehosp Disaster Med. 2021 Feb;36(1):14-17. doi: 10.1017/S1049023X20001260. Epub 2020 Oct 28.
9
An integrated deep-learning and multi-level framework for understanding the behavior of terrorist groups.一个用于理解恐怖组织行为的集成深度学习与多层次框架。
Heliyon. 2023 Aug 6;9(8):e18895. doi: 10.1016/j.heliyon.2023.e18895. eCollection 2023 Aug.
10
Terrorist Attacks in the Middle East: A Counter-Terrorism Medicine Analysis.中东的恐怖袭击:反恐医学分析
Prehosp Disaster Med. 2022 Mar 3:1-5. doi: 10.1017/S1049023X22000358.

本文引用的文献

1
Performance discrepancy mitigation in heart disease prediction for multisensory inter-datasets.多感官跨数据集心脏病预测中的性能差异缓解
PeerJ Comput Sci. 2024 Mar 18;10:e1917. doi: 10.7717/peerj-cs.1917. eCollection 2024.
2
Detecting cyberbullying using deep learning techniques: a pre-trained glove and focal loss technique.使用深度学习技术检测网络欺凌:预训练手套模型和焦点损失技术
PeerJ Comput Sci. 2024 Mar 27;10:e1961. doi: 10.7717/peerj-cs.1961. eCollection 2024.
3
Deep-HPI-pred: An R-Shiny applet for network-based classification and prediction of Host-Pathogen protein-protein interactions.
深度宿主-病原体相互作用预测:一个用于基于网络的宿主-病原体蛋白质-蛋白质相互作用分类和预测的R-Shiny小程序。
Comput Struct Biotechnol J. 2023 Dec 15;23:316-329. doi: 10.1016/j.csbj.2023.12.010. eCollection 2024 Dec.
4
An integrated deep-learning and multi-level framework for understanding the behavior of terrorist groups.一个用于理解恐怖组织行为的集成深度学习与多层次框架。
Heliyon. 2023 Aug 6;9(8):e18895. doi: 10.1016/j.heliyon.2023.e18895. eCollection 2023 Aug.
5
Terrorist attacks sharpen the binary perception of "Us" vs. "Them".恐怖袭击加剧了“我们”与“他们”的二元对立观念。
Sci Rep. 2023 Aug 1;13(1):12451. doi: 10.1038/s41598-023-39035-3.
6
A posterior probability based Bayesian method for single-cell RNA-seq data imputation.基于后验概率的贝叶斯单细胞 RNA-seq 数据插补方法。
Methods. 2023 Aug;216:21-38. doi: 10.1016/j.ymeth.2023.06.004. Epub 2023 Jun 12.
7
Feature selection of EEG signals in neuromarketing.神经营销中脑电图信号的特征选择
PeerJ Comput Sci. 2022 Apr 26;8:e944. doi: 10.7717/peerj-cs.944. eCollection 2022.
8
Multi-label emotion classification of Urdu tweets.乌尔都语推文的多标签情感分类
PeerJ Comput Sci. 2022 Apr 22;8:e896. doi: 10.7717/peerj-cs.896. eCollection 2022.
9
Network intrusion detection using oversampling technique and machine learning algorithms.使用过采样技术和机器学习算法的网络入侵检测
PeerJ Comput Sci. 2022 Jan 7;8:e820. doi: 10.7717/peerj-cs.820. eCollection 2022.
10
Link Prediction Between Structured Geopolitical Events: Models and Experiments.结构化地缘政治事件之间的链接预测:模型与实验
Front Big Data. 2021 Nov 30;4:779792. doi: 10.3389/fdata.2021.779792. eCollection 2021.