[1]张远煌,操宏均.恶性暴力犯罪的发生机理与防控对策反思——以周克华系列持枪抢劫案为视角[J].法治研究,2013(8):117-124
ZHANG Yuanhuang,CAO Hongjun.The occurring mechanism of vicious violent crimes and reflections on prevention and control countermeasures,from the prospective of Zhou Kehua’s Series of robbery with guns[J].Research on Rule of Law,2013(8):117-124.
[2]王占军.重点人口动态管控服务体系建构研究[J].中国刑警学院学报,2018(2):55-60.
WANG Zhanjun.Study on service system construction of dynamic control of monitored population[J].Journal of Criminal Investigation Police University of China,2018(2):55-60.
[3]中华人民共和国公安部.2018年中国毒品形势报告[R/OL].(2019-06-18)[2019-06-18].http://www.gov.cn/xinwen/2019-06/18/content_5401230.htm.
[4]OZER M,KELES I,TOROSLU I H,et al.Predicting the change of location of mobile phone users[C]//Proceedings of the Second ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems.2013:43-50.
[5]YU Z G.Trajectory data mining:an overview[J].Acm Transactions on Intelligent Systems & Technology,2015,6(3):1-41.
[6]LEE J G,HAN J,LI X.Trajectory outlier detection:a partition-and-detect framework[C]//2008 IEEE 24th International Conference on Data Engineering.IEEE,2008:140-149.
[7]张宇迪.基于WiFi的异常轨迹预警系统设计与实现[D].贵阳:贵州大学,2017.
[8]吉根林,赵斌.时空轨迹大数据模式挖掘研究进展[J].数据采集与处理,2015,30(1):47-58
JI Genlin,ZHAO Bin.Research process in pattern mining for big spatio-temporal trajectories[J].Journal of Data Acquisition and Processing,2015,30(1):47-58.
[9]仇功达,何明,杨杰,等.异常轨迹数据预警与预测关键技术综述[J].系统仿真学报,2017,29(11):2608-2617.
CHOU Gongda,HE Ming,YANG Jie,et al.Key technologies of precaution and prediction of abnormal spatial-temporal trajectory:areview of recent advances[J].Journal of System Simulation,2017,29(11):2608-2617.
[10]YU Y,CAO L,RUNDENSTEINER E A,et al.Detecting moving object outliers in massive-scale trajectory streams[C]//Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining.2014:422-431.
[11]OMPRAKASH K,ABDUl H A,YUE C,et al.Internet of vehicles:motivation,layered architecture network model challenges and future aspects[J].IEEE Access,2016,9:5356-5373.
[12]WANG Q,LYU W,DU B.Spatio-temporal anomaly detection in traffic data[C]//Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control.2018:1-5.
[13]WANG Y H.GONALO HAC,BARTVAN A,et al.Understanding travellers’ preferences for different types of trip destination based on mobile internet usage data[J].Transportation Research Part C:Emerging Technologies,2018,90:247-259.
[14]林强,张淋均,谢艾伶,等.不安全越界行为的个性化实时检测[J].计算机科学与探索,2020,6(14):1017-1027.
LIN Qiang,ZHANG Linjun,XIE Ailing,et al.Personalized real-time detection of unsafe boundary transgression[J].Journal of Frontiers of Computer Science and Technology,2020,6(14):1017-1027.
[15]董观利,宋春林.基于视频的矿井行人越界检测系统[J].工矿自动化,2017(2):29-34.
DONG Guanli,SONG Chunlin.Underground pedestrian crosing detection system based on video[J].Industry and Mine Automation,2017(2):29-34.
[16]顾国强.基于智能识别的人员密集场所安防预警系统[J].港口科技,2019(8):19-23.
GU Guoqiang.Early warning system for crowded places based on intelligent recognition[J].Journal of Port Science and Technology,2019(8):19-23.
[17]ESTER M,KRIEGEL H P,SABDER J,et al.A density-based algorithm for discovering clusters in large spatial databases with noise[J].AAAI Press,1996(37):226-231.
[18]司鹄,贾文梅.城市公共安全风险评估指标敏感性分析[J].中国安全生产科学技术,2014,10(11):71-76.
SI Hu,JIA Wenmei.Analysis on sensitivity of indexes for risk assessment on urban public safety[J].Journal of Safety Science and Technology,2014,10 (11):71-76.
[19]孙华丽,项美康,薛耀锋.超大城市公共安全风险评估、归因与防范[J].中国安全生产科学技术,2018,14(8):74-79.
SUN Huali,XIANG Meikang,XUE Yaofeng.Assessment,attribution and prevention of public safety risk in megacity[J].Journal of Safety Science and Technology,2018,14 (8):74-79.
[20]YU Z,YU K C,XING X,et al.GeoLife 2.0:a location-based social networking service[A]:IEEE,2009:357-358.
[21]ZHENG Y,ZHANG L,XIE X,et al.Mining interesting locations and travel sequences from GPS trajectories[C]//Proceedings of the 18th International Conference on World Wide Web.2009:791-800.