skip to main content
10.1145/3539618.3592074acmconferencesArticle/Chapter ViewAbstractPublication PagesirConference Proceedingsconference-collections
short-paper
Open access

TripSafe: Retrieving Safety-related Abnormal Trips in Real-time with Trajectory Data

Published: 18 July 2023 Publication History

Abstract

Nowadays safety has become one of the most critical factors for ride-hailing service. Ride-hailing platforms have conducted meticulous background checks for drivers to minimize the risk of abnormal trips, e.g. violence and sexual assault. However, current methods are labor-consuming and highly rely on the personal information of drivers, which may harm the fairness of the order dispatching system. In this paper, we utilize the trip trajectories as inputs and propose a dual variational auto-encoder(VAE) framework, namely TripSafe, to estimate the probability of abnormal safety incidents. Specifically, TripSafe models the moving behavior and route information, as two independent components and employs VAEs to pre-train generative models for normal trips. Then, a fusion network is adopted to fine-tune the whole model with a few labeled samples. In practice, TripSafe monitors the data update and calculate the anomaly score of partial-observed trips in real-time. Experiments on real ridehailing data show that TripSafe is superior to the state-of-the-art baselines with about 14.2%~28.9% improvements on F1 score.

References

[1]
Charlotte Brace, Michelle Whelan, Belinda Clark, and Jennie Oxley. 2009. The relationship between crime and road safety. Technical Report.
[2]
Chao Chen, Daqing Zhang, Pablo Samuel Castro, Nan Li, Lin Sun, Shijian Li, and Zonghui Wang. 2013. iBOAT: Isolation-based online anomalous trajectory detection. IEEE Transactions on Intelligent Transportation Systems 14, 2 (2013), 806--818.
[3]
Xu Chen, Qiu Qiu, Changshan Li, and Kunqing Xie. 2022. GraphAD: A Graph Neural Network for Entity-Wise Multivariate Time-Series Anomaly Detection. In Proceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval. 2297--2302.
[4]
Xiaokai Chu, Jiashu Zhao, Xinxin Fan, Di Yao, Zhihua Zhu, Lixin Zou, Dawei Yin, and Jingping Bi. 2022. Contrastive Disentangled Graph Convolutional Network for Weakly-Supervised Classification. In Database Systems for Advanced Applications - 27th International Conference, DASFAA 2022, Virtual Event, April 11--14, 2022, Proceedings, Part I (Lecture Notes in Computer Science), Vol. 13245. Springer, 722--730. https://doi.org/10.1007/978--3-031-00123--9_57
[5]
Peng Han, Jin Wang, Di Yao, Shuo Shang, and Xiangliang Zhang. 2021. A Graph-based Approach for Trajectory Similarity Computation in Spatial Networks. In ACM SIGKDD. ACM, 556--564. https://doi.org/10.1145/3447548.3467337
[6]
Xiaolin Han, Reynold Cheng, Chenhao Ma, and Tobias Grubenmann. 2022. DeepTEA: effective and efficient online time-dependent trajectory outlier detection. Proceedings of the VLDB Endowment 15, 7 (2022), 1493--1505.
[7]
Qi He, Kuiyu Chang, and Ee-Peng Lim. 2007. Analyzing feature trajectories for event detection. In SIGIR 2007: Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Amsterdam, The Netherlands, July 23--27, 2007. ACM, 207--214. https://doi.org/10.1145/1277741.1277779
[8]
Quanliang Jing, Shuo Liu, Xinxin Fan, Jingwei Li, Di Yao, Baoli Wang, and Jingping Bi. 2022. Can Adversarial Training benefit Trajectory Representation?: An Investigation on Robustness for Trajectory Similarity Computation. In Proceedings of the 31st ACM International Conference on Information & Knowledge Management, Atlanta, GA, USA, October 17--21, 2022. ACM, 905--914. https://doi.org/10.1145/3511808.3557250
[9]
Diederik P Kingma and Max Welling. 2013. Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114 (2013).
[10]
Thomas N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016).
[11]
Rikard Laxhammar and G�ran Falkman. 2013. Online learning and sequential anomaly detection in trajectories. TPAMI 36, 6 (2013), 1158--1173.
[12]
Peipei Li, Junjie Yao, Liping Wang, and Xuemin Lin. 2017. SPOT: Selecting occuPations frOm Trajectories. In Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval, Shinjuku, Tokyo, Japan, August 7--11, 2017. ACM, 813--816. https://doi.org/10.1145/3077136.3080651
[13]
Wenbin Li, Xiaokai Chu, Yueyang Su, Di Yao, Shiwei Zhao, Runze Wu, Shize Zhang, Jianrong Tao, Hao Deng, and Jingping Bi. 2022. FingFormer: Contrastive Graph-based Finger Operation Transformer for Unsupervised Mobile Game Bot Detection. In WWW. ACM, 3367--3375. https://doi.org/10.1145/3485447.3512272
[14]
Liangkai Liu, Xingzhou Zhang, Mu Qiao, and Weisong Shi. 2018. SafeShareRide: Edge-based attack detection in ridesharing services. In 2018 IEEE/ACM Symposium on Edge Computing (SEC). IEEE, 17--29.
[15]
Yiding Liu, Kaiqi Zhao, Gao Cong, and Zhifeng Bao. 2020. Online anomalous trajectory detection with deep generative sequence modeling. In 2020 IEEE 36th International Conference on Data Engineering (ICDE). IEEE, 949--960.
[16]
Yen-Cheng Lu, Chih-Wei Wu, Chang-Tien Lu, and Alexander Lerch. 2016. An Unsupervised Approach to Anomaly Detection in Music Datasets. In Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval, SIGIR 2016, Pisa, Italy, July 17--21, 2016. ACM, 749--752. https://doi.org/10.1145/2911451.2914700
[17]
Xuying Meng, Suhang Wang, Zhimin Liang, Di Yao, Jihua Zhou, and Yujun Zhang. 2021. Semi-supervised anomaly detection in dynamic communication networks. Inf. Sci. 571 (2021), 527--542. https://doi.org/10.1016/j.ins.2021.04.056
[18]
Xuying Meng, Yequan Wang, Suhang Wang, Di Yao, and Yujun Zhang. 2021. Interactive Anomaly Detection in Dynamic Communication Networks. IEEE/ACM Trans. Netw. 29, 6 (2021), 2602--2615. https://doi.org/10.1109/TNET.2021.3097137
[19]
Yueyang Su, Di Yao, Xiaokai Chu, Wenbin Li, Jingping Bi, Shiwei Zhao, Runze Wu, Shize Zhang, Jianrong Tao, and Hao Deng. 2022. Few-shot Learning for Trajectory-based Mobile Game Cheating Detection. In KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14 - 18, 2022. ACM, 3941--3949. https://doi.org/10.1145/3534678.3539157
[20]
Fei Wang, Di Yao, Yong Li, Tao Sun, and Zhao Zhang. 2023. AI-enhanced spatial-temporal data-mining technology: New chance for next-generation urban computing. The Innovation 4, 2 (2023).
[21]
Sheng Wang, Zhifeng Bao, J Shane Culpepper, Zizhe Xie, Qizhi Liu, and Xiaolin Qin. 2018. Torch: A search engine for trajectory data. In The 41st International ACM SIGIR Conference on Research & Development in Information Retrieval. 535--544.
[22]
Yanling Wang, Jing Zhang, Shasha Guo, Hongzhi Yin, Cuiping Li, and Hong Chen. 2021. Decoupling Representation Learning and Classification for GNN-based Anomaly Detection. In SIGIR '21: The 44th International ACM SIGIR Conference on Research and Development in Information Retrieval, Virtual Event, Canada, July 11--15, 2021. ACM, 1239--1248. https://doi.org/10.1145/3404835.3462944
[23]
Hao Wu, Weiwei Sun, and Baihua Zheng. 2017. A fast trajectory outlier detection approach via driving behavior modeling. In Proceedings of the 2017 ACM on Conference on Information and Knowledge Management. 837--846.
[24]
Di Yao, Gao Cong, Chao Zhang, and Jingping Bi. 2019. Computing Trajectory Similarity in Linear Time: A Generic Seed-Guided Neural Metric Learning Approach. In ICDE. IEEE, 1358--1369. https://doi.org/10.1109/ICDE.2019.00123
[25]
Di Yao, Haonan Hu, Lun Du, Gao Cong, Shi Han, and Jingping Bi. 2022. TrajGAT: A Graph-based Long-term Dependency Modeling Approach for Trajectory Similarity Computation. In KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14 - 18, 2022. ACM, 2275--2285. https://doi.org/10.1145/3534678.3539358
[26]
Di Yao, Chao Zhang, Zhihua Zhu, Qin Hu, Zheng Wang, Jian-Hui Huang, and Jingping Bi. 2018. Learning deep representation for trajectory clustering. Expert Syst. J. Knowl. Eng. 35, 2 (2018). https://doi.org/10.1111/exsy.12252
[27]
Di Yao, Chao Zhang, Zhihua Zhu, Jian-Hui Huang, and Jingping Bi. 2017. Trajectory clustering via deep representation learning. In IJCNN. IEEE, 3880--3887. https://doi.org/10.1109/IJCNN.2017.7966345
[28]
Dongxiang Zhang, Zhihao Chang, Sai Wu, Ye Yuan, Kian-Lee Tan, and Gang Chen. 2020. Continuous trajectory similarity search for online outlier detection. IEEE Transactions on Knowledge and Data Engineering (2020).
[29]
Qingyang Zhang, Hui Sun, Xiaopei Wu, and Hong Zhong. 2019. Edge video analytics for public safety: A review. Proc. IEEE 107, 8 (2019), 1675--1696.
[30]
Silin Zhou, Peng Han, Di Yao, Lisi Chen, and Xiangliang Zhang. 2022. Spatial-temporal fusion graph framework for trajectory similarity computation. World Wide Web (2022), 1--23.
[31]
Xiaokang Zhou, Wei Liang, Shohei Shimizu, Jianhua Ma, and Qun Jin. 2020. Siamese neural network based few-shot learning for anomaly detection in industrial cyber-physical systems. IEEE Transactions on Industrial Informatics 17, 8 (2020), 5790--5798.
[32]
Jie Zhu, Wei Jiang, An Liu, Guanfeng Liu, and Lei Zhao. 2017. Effective and efficient trajectory outlier detection based on time-dependent popular route. World Wide Web 20 (2017), 111--134.
[33]
Zhihua Zhu, Di Yao, Jianhui Huang, Hanqiang Li, and Jingping Bi. 2018. Sub-trajectory- and Trajectory-Neighbor-based Outlier Detection over Trajectory Streams. In PAKDD, Vol. 10937. Springer, 551--563. https://doi.org/10.1007/978--3--319--93034--3_44

Cited By

View all
  • (2024)Multi-Scale Detection of Anomalous Spatio-Temporal Trajectories in Evolving Trajectory DatasetsProceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3637528.3671874(2980-2990)Online publication date: 25-Aug-2024

Index Terms

  1. TripSafe: Retrieving Safety-related Abnormal Trips in Real-time with Trajectory Data

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SIGIR '23: Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval
    July 2023
    3567 pages
    ISBN:9781450394086
    DOI:10.1145/3539618
    This work is licensed under a Creative Commons Attribution International 4.0 License.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 18 July 2023

    Check for updates

    Author Tags

    1. ride-hailing services
    2. risk estimation
    3. trajectory data mining safety events

    Qualifiers

    • Short-paper

    Funding Sources

    Conference

    SIGIR '23
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 792 of 3,983 submissions, 20%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)401
    • Downloads (Last 6 weeks)52
    Reflects downloads up to 16 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Multi-Scale Detection of Anomalous Spatio-Temporal Trajectories in Evolving Trajectory DatasetsProceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3637528.3671874(2980-2990)Online publication date: 25-Aug-2024

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media