OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Master's Thesis Presentation
1. Proposal of a Terrorist
Detection Model in
Social Networks
Master’s thesis defense
Presented By : Wajdi Khattel on 07.12.2019
2018 / 2019
In front of jury composed of:
● President: Najet AROUS
● Evaluator: Olfa EL MOURALI
● Academic supervisor: Ramzi GUETARI
● Laboratory supervisor: Nour El Houda BEN CHAABENE
4. Context
▰The appearance of social networks created an ease of
communication
▰The usage of social networks differs: Friendly vs harmful
▰Terrorists are one of the most dangerous category
▰The detection of these users is important
4
5. Problematic
▰Terrorists tend to hide their abnormal behavior
▰Normal user could adopt terrorist behavior
▰Socio-cultural definition of a terrorist could change over time
⇒ Time is important
5
6. Objective
▰Propose a terrorist detection model
▻Consider over-time user’s behavior change
▻Consider over-time behavior’s definition change
▰Cover Limitation of existing models
6
9. Anomaly Detection
9
Paper Input
Format
Description Multiple
Social
Networks
Multiple
Input data
types
User’s
Behavior
Change
Behavior
Definition
Change
Lashakry et al.,
2019
Activity Proposal of model for user profile
creation to monitor users
✓ ✓ ✗ ✗
Zamanian et
al.,2019
Activity Proposal of model for user activity
pattern recognition
✗ ✓ ✓ ✗
Bhattacharjee
et al., 2017
Graph Proposal of a probabilistic anomaly
classifier mode
✗ ✗ ✓ ✓
Chen et al.,
2018
Graph Proposal of a user profiling
framework that can be used to
detect anomalous users
✗ ✓ ✗ ✗
11. 11
Terrorism Detection
Alvari et al. (2019)
- Different data
collecting methods
- Textual-content data
features
Chitrakar et al.
(2016)
Kalpakis et al. (2019)
- Advantages of using
Convolutional Neural
Network (CNN)
- Advantages of using
Transfer Learning
Technique
- Advantages of using
multidimensional
networks
- Social Network
Analysis
methodologies
13. ▰Model Input: Multidimensional Network
▰Three sub-models:
▻Text classification model
▻Image classification model
▻General Information classification model
▰Decision Making
13
Proposed Model
15. ▰Input: Textual data
▰Process:
▻Natural Language Processing
▻Word Embedding
▻Machine Learning classification
▰Output: Score
15
Text Classification Model (TCM)
16. ▰Objective: Make the machine able to understand the human
language
▰Process:
▻Morphological Analysis
▻Syntactical Analysis
▻Semantical Analysis
16
TCM: Natural Language Processing
17. ▰Objective: Represent text in a numerical way
while preserving its semantics
▰Process:
▻Term Frequency-Inverse Document Frequency
(TF-IDF)
17
TCM: Word Embedding
18. ▰Input: Image data
▰Process:
▻Use pre-trained convolutional neural network
model
▻Add new convolutional layers
▰Output: Score
19
Image Classification Model (ICM)
20. ▰Input: General Information data
▰Process:
▻If data is non-numerical ⇒ Encode it
▻Machine Learning classification
▰Output: Score
21
General Information Classification Model
21. ▰Input: 3 submodels scores
▰Process:
▻Calculate user score
▻Classify it based on threshold
▰Output: User category (Terrorist or not)
22
Decision Making
TCM ICM GICM
Decision
Making
S1
S1 = Score1 * Weight1
S2 = Score2 * Weight2
S3 = Score3 * Weight3
S2 S3
24. ▰Offline Data: Data used for the model training
▻Textual Data: Tweets from banned Twitter accounts
▻Image Data: Images from google image
▻General Information Data: PIRUS dataset
▰Online Data: Data used for testing and live usage
▻Facebook Graph API
▻Instagram REST API
▻Twitter REST API
25
Data Collection