Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Crime in Urban Areas:: A Data Mining Perspective

Published: 29 May 2018 Publication History

Abstract

Urban safety and security play a crucial role in improving life quality of citizen and the sustainable development of urban. Traditional urban crime research focused on leveraging demographic data, which is insufficient to capture the complexity and dynamics of urban crimes. In the era of big data, we have witnessed advanced ways to collect and integrate fine-grained urban, mobile, and public service data that contains various crime-related sources as well as rich environmental and social information. The availability of big urban data provides unprecedented opportunities, which enable us to conduct advanced urban crime research. Meanwhile, environmental and social crime theories from criminology provide better understandings about the behaviors of offenders and complex patterns of crime in urban. They can not only help bridge the gap from what we have (big urban data) to what we want to understand about urban crime (urban crime analysis); but also guide us to build computational models for crime. In this article, we give an overview to key theories from criminology, summarize crime analysis on urban data, review state-of-the-art algorithms for various types of computational crime tasks and discuss some appealing research directions that can bring the urban crime research into a new frontier.

References

[1]
S. Aghababaei and M. Makrehchi. Mining social media content for crime prediction. In Web Intelligence (WI), 2016 IEEE/WIC/ACM International Conference on, pages 526-531. IEEE, 2016.
[2]
A. B. Barbaro, L. Chayes, and M. R. D'Orsogna. Territorial developments based on graffiti: A statistical mechanics approach. Physica A: Statistical Mechanics and its Applications, 392(1):252-270, 2013.
[3]
S. Bates. Spatial and temporal analysis of crime. Research Bulletin, April, 1987.
[4]
K. Behrens and F. Robert-Nicoud. Survival of the fittest in cities: Urbanisation and inequality. The Economic Journal, 124(581):1371-1400, 2014.
[5]
H. Berestycki, J. Wei, and M. Winter. Existence of symmetric and asymmetric spikes for a crime hotspot model. SIAM Journal on Mathematical Analysis, 46(1):691-719, 2014.
[6]
K. Bowers, M. Newton, and R. Nutter. A gis-linked database for monitoring repeat domestic burglary. Mapping and Analysing Crime Data-Lessons from Research and Practice, pages 120-137, 2001.
[7]
J. Braithwaite. Crime, shame and reintegration. Cambridge University Press, 1989.
[8]
J. Braithwaite. Inequality, Crime and Public Policy (Routledge Revivals). Routledge, 2013.
[9]
P. J. Brantingham, P. L. Brantingham, et al. Environmental criminology. Sage Publications Beverly Hills, CA, 1981.
[10]
P. J. Brantingham and C. R. Jeffery. Afterword: Crime, space, and criminological theory. Environmental criminology, pages 227-237, 1981.
[11]
P. L. Brantingham and P. J. Brantingham. Notes on the geometry of crime. Environmental criminology, 1981.
[12]
M. Camacho-Collados and F. Liberatore. A decision support system for predictive police patrolling. Decision Support Systems, 75:25-37, 2015.
[13]
M. Camacho-Collados, F. Liberatore, and J. M. Angulo. A multi-criteria police districting problem for the efficient and effective design of patrol sector. European Journal of Operational Research, 246(2):674- 684, 2015.
[14]
S. Chainey and J. Ratcliffe. GIS and crime mapping. John Wiley & Sons, 2013.
[15]
S. S. Chawathe. Organizing hot-spot police patrol routes. In Intelligence and Security Informatics, 2007 IEEE, pages 79-86. IEEE, 2007.
[16]
H. Chen, T. Cheng, and J. Shawe-Taylor. A balanced route design for min-max multiple-depot rural postman problem (mmmdrpp): a police patrolling case. International Journal of Geographical Information Science, 32(1):169-190, 2018.
[17]
P. Chen, H. Yuan, and X. Shu. Forecasting crime using the arima model. In Fuzzy Systems and Knowledge Discovery, 2008. FSKD'08. Fifth International Conference on, volume 5, pages 627-630. IEEE, 2008.
[18]
X. Chen. Fast patrol route planning in dynamic environments. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 42(4):894- 904, 2012.
[19]
X. Chen and T.-S. P. Yum. Cross entropy approach for patrol route planning in dynamic environments. In Intelligence and Security Informatics (ISI), 2010 IEEE International Conference on, pages 114-119. IEEE, 2010.
[20]
X. Chen and T.-S. P. Yum. Patrol districting and routing with security level functions. In Systems Man and Cybernetics (SMC), 2010 IEEE International Conference on, pages 3555-3562. IEEE, 2010.
[21]
R. Clarke. Introduction: Criminology, routine activity, and rational choice (from routine activity and rational choice: Advances in criminological theory, volume 5, p 1-14, 1993, ronald v. clarke and marcus felson, eds.-see ncj-159998). 1993.
[22]
R. V. Clarke and M. FELSON. Opportunity makes the thief: Practical theory for crime prevention. Police Research Series, 1998.
[23]
R. V. G. Clarke. Situational crime prevention. Criminal Justice Press Monsey, NY, 1997.
[24]
A. K. Cohen. Delinquent boys (glencoe, ill, 1955.
[25]
L. E. Cohen and M. Felson. Social change and crime rate trends: A routine activity approach. American sociological review, pages 588-608, 1979.
[26]
E. G. Cohn. Weather and crime. British journal of criminology, 30(1):51-64, 1990.
[27]
D. B. Cornish and R. V. Clarke. The reasoning criminal: Rational choice perspectives on offending. Transaction Publishers, 2014.
[28]
C. Couch and A. Dennemann. Urban regeneration and sustainable development in britain: The example of the liverpool ropewalks partnership. Cities, 17(2):137- 147, 2000.
[29]
A. Crawford and K. Evans. Crime prevention and community safety. Oxford University Press, 2017.
[30]
D. J. Daley and D. Vere-Jones. An introduction to the theory of point processes: volume II: general theory and structure. Springer Science & Business Media, 2007.
[31]
J. F. de Queiroz Neto, E. M. dos Santos, and C. A. Vidal. Mskde-using marching squares to quickly make high quality crime hotspot maps. In Graphics, Patterns and Images (SIBGRAPI), 2016 29th SIBGRAPI Conference on, pages 305-312. IEEE, 2016.
[32]
W. Ding, T. Stepinski, and J. Salazar. Discovery of geospatial discriminating patterns from remote sensing datasets. In Proceedings of the 2009 SIAM International Conference on Data Mining, pages 425-436. SIAM, 2009.
[33]
M. R. D'Orsogna and M. Perc. Statistical physics of crime: A review. Physics of life reviews, 12:1-21, 2015.
[34]
J. Eck, S. Chainey, J. Cameron, and R. Wilson. Mapping crime: Understanding hotspots. 2005.
[35]
J. E. Eck and J. Wartell. Reducing crime and drug dealing by improving place management: A randomized experiment. US Department of Justice, Office of Justice Programs, National Institute of Justice, 1997.
[36]
I. Ehrlich. On the relation between education and crime. In Education, income, and human behavior, pages 313-338. NBER, 1975.
[37]
M. Felson. Crime and everyday life: Insight and implications for society. Thousand Oaks, CA: Pine, 1994.
[38]
M. Felson and L. E. Cohen. Human ecology and crime: A routine activity approach. Human Ecology, 8(4):389-406, 1980.
[39]
E. Ferrara, P. De Meo, S. Catanese, and G. Fiumara. Detecting criminal organizations in mobile phone networks. Expert Systems with Applications, 41(13):5733-5750, 2014.
[40]
S. Field. The effect of temperature on crime. The British Journal of Criminology, 32(3):340-351, 1992.
[41]
M. Fossett. Ethnic preferences, social distance dynamics, and residential segregation: Theoretical explorations using simulation analysis?. Journal of Mathematical Sociology, 30(3-4):185-273, 2006.
[42]
J. Fox, G. P. Learmonth Sr, and D. E. Brown. Simulating spatial-temporal pulse events in criminal site selection problems. In Proceedings of the 2012 Symposium on Agent Directed Simulation, page 7. Society for Computer Simulation International, 2012.
[43]
V. Furtado, A. Melo, R. Menezes, and M. Belchior. Using self-organization in an agent framework to model criminal activity in response to police patrol routes. In FLAIRS Conference, pages 68-73, 2006.
[44]
Y. Gao, Y. Xia, S. Wu, and J. Qiao. Solution to gang crime based on graph theory and analytical hierarchy process. Neurocomputing, 140:121-127, 2014.
[45]
M. S. Gerber. Predicting crime using twitter and kernel density estimation. Decision Support Systems, 61:115-125, 2014.
[46]
S. Gholami, C. Zhang, A. Sinha, and M. Tambe. An extensive study of dynamic bayesian network for patrol allocation against adaptive opportunistic criminals. 2015.
[47]
A. Godwin and J. Stasko. Hotsketch: Drawing police patrol routes among spatiotemporal crime hotspots. In Proceedings of the 50th Hawaii International Conference on System Sciences, 2017.
[48]
W. Gorr, A. Olligschlaeger, and Y. Thompson. Shortterm forecasting of crime. International Journal of Forecasting, 19(4):579-594, 2003.
[49]
M. R. Gottfredson and T. Hirschi. A general theory of crime. Stanford University Press, 1990.
[50]
J. Hagan. Crime and inequality. Stanford University Press, 1995.
[51]
K. A. Harries. Mapping crime: Principle and practice. Technical report, 1999.
[52]
T. Hart and P. Zandbergen. Kernel density estimation and hotspot mapping: examining the influence of interpolation method, grid cell size, and bandwidth on crime forecasting. Policing: An International Journal of Police Strategies & Management, 37(2):305-323, 2014.
[53]
R. A. Hegemann, L. M. Smith, A. B. Barbaro, A. L. Bertozzi, S. E. Reid, and G. E. Tita. Geographical influences of an emerging network of gang rivalries. Physica A: Statistical Mechanics and its Applications, 390(21):3894-3914, 2011.
[54]
T. Hirschi. Causes of delinquency. Transaction publishers, 2002.
[55]
T. Hu, X. Ye, L. Duan, and X. Zhu. Integrating near repeat and social network approaches to analyze crime patterns. In Geoinformatics, 2017 25th International Conference on, pages 1-4. IEEE, 2017.
[56]
S. D. Johnson, K. Bowers, and A. Hirschfield. New insights into the spatial and temporal distribution of repeat victimization. The British Journal of Criminology, 37(2):224-241, 1997.
[57]
S. D. Johnson and K. J. Bowers. The stability of spacetime clusters of burglary. British Journal of Criminology, 44(1):55-65, 2004.
[58]
H.-W. Kang and H.-B. Kang. Prediction of crime occurrence from multi-modal data using deep learning. PloS one, 12(4):e0176244, 2017.
[59]
B. P. Kennedy, I. Kawachi, D. Prothrow-Stith, K. Lochner, and V. Gupta. Social capital, income inequality, and firearm violent crime. Social science & medicine, 47(1):7-17, 1998.
[60]
M. W. Klein. Labeling theory and delinquency policy: An experimental test. Criminal Justice and Behavior, 13(1):47-79, 1986.
[61]
R. R. Kornhauser. Social sources of delinquency: An appraisal of analytic models. University of Chicago Press Chicago, 1978.
[62]
J. L. LeBeau. 7 mapping out hazardous space for police work1, 2. Mapping and analysing crime data: Lessons from research and practice, page 139, 2001.
[63]
K. Leong and A. Sung. A review of spatio-temporal pattern analysis approaches on crime analysis. International E-journal of Criminal Sciences, 9:1-33, 2015.
[64]
N. Levine. Crime mapping and the crimestat program. Geographical analysis, 38(1):41-56, 2006.
[65]
E. Lewis, G. Mohler, P. J. Brantingham, and A. L. Bertozzi. Self-exciting point process models of civilian deaths in iraq. Security Journal, 25(3):244-264, 2012.
[66]
A. Loukaitou-Sideris. Hot spots of bus stop crime: The importance of environmental attributes. Journal of the American Planning association, 65(4):395-411, 1999.
[67]
M. W. Macy and A. Van De Rijt. Ethnic preferences and residential segregation: Theoretical explorations beyond detroit. Journal of Mathematical Sociology, 30(3-4):275-288, 2006.
[68]
R. K. Merton. Social theory and social structure. Simon and Schuster, 1968.
[69]
G. O. Mohler, M. B. Short, P. J. Brantingham, F. P. Schoenberg, and G. E. Tita. Self-exciting point process modeling of crime. Journal of the American Statistical Association, 106(493):100-108, 2011.
[70]
M. Moonen, D. Cattrysse, and D. Van Oudheusden. Organising patrol deployment against violent crimes. Operational Research, 7(3):401-417, 2007.
[71]
Y. Mu, W. Ding, M. Morabito, and D. Tao. Empirical discriminative tensor analysis for crime forecasting. Knowledge Science, Engineering and Management, pages 293-304, 2011.
[72]
A. Mukhopadhyay, C. Zhang, Y. Vorobeychik, M. Tambe, K. Pence, and P. Speer. Optimal allocation of police patrol resources using a continuoustime crime model. In International Conference on Decision and Game Theory for Security, pages 139-158. Springer, 2016.
[73]
C. Oyvat. How urbanization affects the inequality in developing countries: A critique of kuznets curve. In University of Massachusetts-New School University Economics Graduate Student Workshop, pages 23-24, 2010.
[74]
A. V. Papachristos, D. M. Hureau, and A. A. Braga. The corner and the crew: the influence of geography and social networks on gang violence. American sociological review, 78(3):417-447, 2013.
[75]
E. B. Patterson. Poverty, income inequality, and community crime rates. Criminology, 29(4):755-776, 1991.
[76]
D. Paulo, B. Fischl, T. Markow, M. Martin, and P. Shakarian. Social network intelligence analysis to combat street gang violence. In Advances in Social Networks Analysis and Mining (ASONAM), 2013 IEEE/ACM International Conference on, pages 1042- 1049. IEEE, 2013.
[77]
M. Perc, J. Gómez-Gardeñes, A. Szolnoki, L. M. Floria, and Y. Moreno. Evolutionary dynamics of group interactions on structured populations: a review. Journal of the royal society interface, 10(80):20120997, 2013.
[78]
Z. Qi, T. Wang, G. Song, W. Hu, X. Li, et al. Deep air learning: Interpolation, prediction, and feature analysis of fine-grained air quality. arXiv preprint arXiv:1711.00939, 2017.
[79]
C. Qian, Y. Wang, J. Cao, J. Lu, and J. Kurths. Weighted-traffic-network-based geographic profiling for serial crime location prediction. EPL (Europhysics Letters), 93(6):68006, 2011.
[80]
M. Ranson. Crime, weather, and climate change. Journal of environmental economics and management, 67(3):274-302, 2014.
[81]
J. Ratcliffe and M. McCullagh. Crime, repeat victimisation and gis. Mapping and analysing crime data, pages 61-92, 2001.
[82]
J. H. Ratcliffe and M. J. McCullagh. Hotbeds of crime and the search for spatial accuracy. Journal of geographical systems, 1(4):385-398, 1999.
[83]
R. J. Sampson, S. W. Raudenbush, and F. Earls. Neighborhoods and violent crime: A multilevel study of collective efficacy. Science, 277(5328):918-924, 1997.
[84]
T. C. Schelling. Dynamic models of segregation. Journal of mathematical sociology, 1(2):143-186, 1971.
[85]
C. R. Shaw and H. D. McKay. Juvenile delinquency and urban areas. 1942.
[86]
M. B. Short, A. L. Bertozzi, and P. J. Brantingham. Nonlinear patterns in urban crime: Hotspots, bifurcations, and suppression. SIAM Journal on Applied Dynamical Systems, 9(2):462-483, 2010.
[87]
M. B. Short, P. J. Brantingham, A. L. Bertozzi, and G. E. Tita. Dissipation and displacement of hotspots in reaction-diffusion models of crime. Proceedings of the National Academy of Sciences, 107(9):3961-3965, 2010.
[88]
M. B. Short, M. R. D'orsogna, P. J. Brantingham, and G. E. Tita. Measuring and modeling repeat and near-repeat burglary effects. Journal of Quantitative Criminology, 25(3):325-339, 2009.
[89]
W. G. Skogan. Disorder and decline: Crime and the spiral of decay in American neighborhoods. Univ of California Press, 1990.
[90]
M. A. Tayebi, L. Bakker, U. Glasser, and V. Dabbaghian. Locating central actors in co-offending networks. In Advances in Social Networks Analysis and Mining (ASONAM), 2011 International Conference on, pages 171-179. IEEE, 2011.
[91]
M. A. Tayebi, M. Ester, U. Glässer, and P. L. Brantingham. Crimetracer: Activity space based crime location prediction. In Advances in Social Networks Analysis and Mining (ASONAM), 2014 IEEE/ACM International Conference on, pages 472-480. IEEE, 2014.
[92]
M. A. Tayebi, M. Ester, U. Glässer, and P. L. Brantingham. Spatially embedded co-offence prediction using supervised learning. In Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 1789-1798. ACM, 2014.
[93]
M. Townsley, R. Homel, and J. Chaseling. Repeat burglary victimisation: Spatial and temporal patterns. Australian & New Zealand journal of criminology, 33(1):37-63, 2000.
[94]
Un-Habitat. Enhancing urban safety and security: Global report on human settlements 2007. Routledge, 2012.
[95]
Y. van Gennip, B. Hunter, R. Ahn, P. Elliott, K. Luh, M. Halvorson, S. Reid, M. Valasik, J. Wo, G. E. Tita, et al. Community detection using spectral clustering on sparse geosocial data. SIAM Journal on Applied Mathematics, 73(1):67-83, 2013.
[96]
D. Wang, W. Ding, H. Lo, T. Stepinski, J. Salazar, and M. Morabito. Crime hotspot mapping using the crime related factors-a spatial data mining approach. Applied intelligence, 39(4):772-781, 2013.
[97]
D. Wang, W. Ding, T. F. Stepinski, J. Salazar, H. Z. Lo, and M. Morabito. Optimization of criminal hotspots based on underlying crime controlling factors using geospatial discriminative pattern. In IEA/AIE, pages 553-562. Springer, 2012.
[98]
H. Wang, D. Kifer, C. Graif, and Z. Li. Crime rate inference with big data. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 635-644. ACM, 2016.
[99]
M. Wang and M. S. Gerber. Using twitter for nextplace prediction, with an application to crime prediction. In Computational Intelligence, 2015 IEEE Symposium Series on, pages 941-948. IEEE, 2015.
[100]
X. Wang, D. E. Brown, and M. S. Gerber. Spatiotemporal modeling of criminal incidents using geographic, demographic, and twitter-derived information. In Intelligence and Security Informatics (ISI), 2012 IEEE International Conference on, pages 36-41. IEEE, 2012.
[101]
X. Wang, M. S. Gerber, and D. E. Brown. Automatic crime prediction using events extracted from twitter posts. In International conference on social computing, behavioral-cultural modeling, and prediction, pages 231-238. Springer, 2012.
[102]
Z. Wang and X. Liu. Analysis of burglary hot spots and near-repeat victimization in a large chinese city. ISPRS International Journal of Geo-Information, 6(5):148, 2017.
[103]
D. Williamson, S. McLafferty, P. McGuire, T. Ross, J. Mollenkopf, V. Goldsmith, and S. Quinn. Tools in the spatial analysis of crime. Mapping and analysing crime data: Lessons from research and practice, 187, 2001.
[104]
J. Q. Wilson and G. L. Kelling. Broken windows. Atlantic monthly, 249(3):29-38, 1982.
[105]
J. Xu and H. Chen. Untangling criminal networks: A case study. In International Conference on Intelligence and Security Informatics, pages 232-248. Springer, 2003.
[106]
Z. Yin and X. Shi. Taming near repeat calculation for crime analysis via cohesive subgraph computing. arXiv preprint arXiv:1705.07746, 2017.
[107]
C.-H. Yu, W. Ding, P. Chen, and M. Morabito. Crime forecasting using spatio-temporal pattern with ensemble learning. In Pacific-Asia Conference on Knowledge Discovery and Data Mining, pages 174-185. Springer, 2014.
[108]
C. Zhang, S. Gholami, D. Kar, A. Sinha, M. Jain, R. Goyal, and M. Tambe. Keeping pace with criminals: An extended study of designing patrol allocation against adaptive opportunistic criminals. Games, 7(3):15, 2016.
[109]
C. Zhang, A. Sinha, and M. Tambe. Keeping pace with criminals: Designing patrol allocation against adaptive opportunistic criminals. In Proceedings of the 2015 international conference on Autonomous agents and multiagent systems, pages 1351-1359. International Foundation for Autonomous Agents and Multiagent Systems, 2015.
[110]
J. Zhang, Y. Zheng, and D. Qi. Deep spatio-temporal residual networks for citywide crowd flows prediction. In AAAI, pages 1655-1661, 2017.
[111]
J. Zhang, Y. Zheng, D. Qi, R. Li, and X. Yi. Dnnbased prediction model for spatio-temporal data. In Proceedings of the 24th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, page 92. ACM, 2016.
[112]
Y. Zhang and D. Brown. Simulation optimization of police patrol districting plans using response surfaces. Simulation, 90(6):687-705, 2014.
[113]
X. Zhao and J. Tang. Modeling temporal-spatial correlations for crime prediction. In Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, pages 497-506. ACM, 2017.

Cited By

View all
  • (2024)ControlTraj: Controllable Trajectory Generation with Topology-Constrained Diffusion ModelProceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3637528.3671866(4676-4687)Online publication date: 25-Aug-2024
  • (2024)OpenSiteRec: An Open Dataset for Site RecommendationProceedings of the 47th International ACM SIGIR Conference on Research and Development in Information Retrieval10.1145/3626772.3657875(1483-1493)Online publication date: 10-Jul-2024
  • (2024)The Nucleation-Annihilation Dynamics of Hotspot Patterns for a Reaction-Diffusion System of Urban Crime with Police DeploymentSIAM Journal on Applied Dynamical Systems10.1137/23M156233023:3(2018-2060)Online publication date: 29-Jul-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGKDD Explorations Newsletter
ACM SIGKDD Explorations Newsletter  Volume 20, Issue 1
June 2018
59 pages
ISSN:1931-0145
EISSN:1931-0153
DOI:10.1145/3229329
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 May 2018
Published in SIGKDD Volume 20, Issue 1

Check for updates

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)109
  • Downloads (Last 6 weeks)16
Reflects downloads up to 15 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)ControlTraj: Controllable Trajectory Generation with Topology-Constrained Diffusion ModelProceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3637528.3671866(4676-4687)Online publication date: 25-Aug-2024
  • (2024)OpenSiteRec: An Open Dataset for Site RecommendationProceedings of the 47th International ACM SIGIR Conference on Research and Development in Information Retrieval10.1145/3626772.3657875(1483-1493)Online publication date: 10-Jul-2024
  • (2024)The Nucleation-Annihilation Dynamics of Hotspot Patterns for a Reaction-Diffusion System of Urban Crime with Police DeploymentSIAM Journal on Applied Dynamical Systems10.1137/23M156233023:3(2018-2060)Online publication date: 29-Jul-2024
  • (2024)Node-Centric Community Deception Based on SafenessIEEE Transactions on Computational Social Systems10.1109/TCSS.2023.330678711:2(2955-2965)Online publication date: Apr-2024
  • (2024)Exploring safety determinants in historic urban areas of Iran: an artificial neural network study in Ardakan historic fabricJournal of Urbanism: International Research on Placemaking and Urban Sustainability10.1080/17549175.2024.2381506(1-29)Online publication date: 16-Aug-2024
  • (2024)PPFCM-SMOTE: a novel balancing system for anomaly detection in IoT edge using probabilistic possibilistic fuzzy clustering and SMOTEInternational Journal of Information Technology10.1007/s41870-024-02129-wOnline publication date: 13-Aug-2024
  • (2023)Supporting Cities towards Carbon Neutral Transition through Territorial AcupunctureSustainability10.3390/su1505404615:5(4046)Online publication date: 23-Feb-2023
  • (2023)PromptST: Prompt-Enhanced Spatio-Temporal Multi-Attribute PredictionProceedings of the 32nd ACM International Conference on Information and Knowledge Management10.1145/3583780.3615016(3195-3205)Online publication date: 21-Oct-2023
  • (2023)MLPST: MLP is All You Need for Spatio-Temporal PredictionProceedings of the 32nd ACM International Conference on Information and Knowledge Management10.1145/3583780.3614969(3381-3390)Online publication date: 21-Oct-2023
  • (2023)Rethinking Sensors Modeling: Hierarchical Information Enhanced Traffic ForecastingProceedings of the 32nd ACM International Conference on Information and Knowledge Management10.1145/3583780.3614910(1756-1765)Online publication date: 21-Oct-2023
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media