{"id":"https://openalex.org/W7117674035","doi":"https://doi.org/10.1109/tcss.2025.3634984","title":"In-Depth Understanding of Crime Dynamics via Space-Time-Context-Aware Tensor Decomposition","display_name":"In-Depth Understanding of Crime Dynamics via Space-Time-Context-Aware Tensor Decomposition","publication_year":2025,"publication_date":"2025-12-31","ids":{"openalex":"https://openalex.org/W7117674035","doi":"https://doi.org/10.1109/tcss.2025.3634984"},"language":null,"primary_location":{"id":"doi:10.1109/tcss.2025.3634984","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcss.2025.3634984","pdf_url":null,"source":{"id":"https://openalex.org/S2490693980","display_name":"IEEE Transactions on Computational Social Systems","issn_l":"2329-924X","issn":["2329-924X","2373-7476"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computational Social Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081342921","display_name":"Weichao Liang","orcid":null},"institutions":[{"id":"https://openalex.org/I4800084","display_name":"Southwest Jiaotong University","ror":"https://ror.org/00hn7w693","country_code":"CN","type":"education","lineage":["https://openalex.org/I4800084"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Weichao Liang","raw_affiliation_strings":["School of Computing and Artificial Intelligence, Southwest Jiaotong University, Chengdu, China"],"raw_orcid":"https://orcid.org/0000-0001-8035-5255","affiliations":[{"raw_affiliation_string":"School of Computing and Artificial Intelligence, Southwest Jiaotong University, Chengdu, China","institution_ids":["https://openalex.org/I4800084"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014729022","display_name":"Guangliang Gao","orcid":"https://orcid.org/0000-0002-8183-2559"},"institutions":[{"id":"https://openalex.org/I4210157581","display_name":"Jiangsu Police Officer College","ror":"https://ror.org/04k1m2t10","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210157581"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guangliang Gao","raw_affiliation_strings":["Department of Computer Information and Cyber Security, Jiangsu Police Institute, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0002-8183-2559","affiliations":[{"raw_affiliation_string":"Department of Computer Information and Cyber Security, Jiangsu Police Institute, Nanjing, China","institution_ids":["https://openalex.org/I4210157581"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Lei Chen","orcid":"https://orcid.org/0000-0002-5537-8989"},"institutions":[{"id":"https://openalex.org/I167027274","display_name":"Nanjing Forestry University","ror":"https://ror.org/03m96p165","country_code":"CN","type":"education","lineage":["https://openalex.org/I167027274"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Chen","raw_affiliation_strings":["College of Information Science and Technology, Nanjing Forestry University, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0002-5537-8989","affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, Nanjing Forestry University, Nanjing, China","institution_ids":["https://openalex.org/I167027274"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121646552","display_name":"Haicheng Tao","orcid":null},"institutions":[{"id":"https://openalex.org/I137056471","display_name":"Nanjing University of Finance and Economics","ror":"https://ror.org/031y8am81","country_code":"CN","type":"education","lineage":["https://openalex.org/I137056471"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haicheng Tao","raw_affiliation_strings":["Jiangsu Provincial Key Laboratory of E-Business, Nanjing University of Finance and Economics, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0002-1286-2578","affiliations":[{"raw_affiliation_string":"Jiangsu Provincial Key Laboratory of E-Business, Nanjing University of Finance and Economics, Nanjing, China","institution_ids":["https://openalex.org/I137056471"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121608221","display_name":"Lilan Peng","orcid":null},"institutions":[{"id":"https://openalex.org/I4800084","display_name":"Southwest Jiaotong University","ror":"https://ror.org/00hn7w693","country_code":"CN","type":"education","lineage":["https://openalex.org/I4800084"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lilan Peng","raw_affiliation_strings":["School of Computing and Artificial Intelligence, Southwest Jiaotong University, Chengdu, China"],"raw_orcid":"https://orcid.org/0000-0001-6793-7074","affiliations":[{"raw_affiliation_string":"School of Computing and Artificial Intelligence, Southwest Jiaotong University, Chengdu, China","institution_ids":["https://openalex.org/I4800084"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009594218","display_name":"Fengmao Lv","orcid":"https://orcid.org/0000-0003-1640-0992"},"institutions":[{"id":"https://openalex.org/I4800084","display_name":"Southwest Jiaotong University","ror":"https://ror.org/00hn7w693","country_code":"CN","type":"education","lineage":["https://openalex.org/I4800084"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fengmao Lv","raw_affiliation_strings":["School of Computing and Artificial Intelligence, Southwest Jiaotong University, Chengdu, China"],"raw_orcid":"https://orcid.org/0000-0003-1640-0992","affiliations":[{"raw_affiliation_string":"School of Computing and Artificial Intelligence, Southwest Jiaotong University, Chengdu, China","institution_ids":["https://openalex.org/I4800084"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5121605883","display_name":"Tianrui Li","orcid":null},"institutions":[{"id":"https://openalex.org/I4800084","display_name":"Southwest Jiaotong University","ror":"https://ror.org/00hn7w693","country_code":"CN","type":"education","lineage":["https://openalex.org/I4800084"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tianrui Li","raw_affiliation_strings":["School of Computing and Artificial Intelligence, Southwest Jiaotong University, Chengdu, China"],"raw_orcid":"https://orcid.org/0000-0001-7780-104X","affiliations":[{"raw_affiliation_string":"School of Computing and Artificial Intelligence, Southwest Jiaotong University, Chengdu, China","institution_ids":["https://openalex.org/I4800084"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5081342921"],"corresponding_institution_ids":["https://openalex.org/I4800084"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.66179002,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"2","first_page":"2269","last_page":"2287"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12303","display_name":"Tensor decomposition and applications","score":0.8406999707221985,"subfield":{"id":"https://openalex.org/subfields/2605","display_name":"Computational Mathematics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12303","display_name":"Tensor decomposition and applications","score":0.8406999707221985,"subfield":{"id":"https://openalex.org/subfields/2605","display_name":"Computational Mathematics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10574","display_name":"Crime Patterns and Interventions","score":0.09929999709129333,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11980","display_name":"Human Mobility and Location-Based Analysis","score":0.006800000090152025,"subfield":{"id":"https://openalex.org/subfields/3313","display_name":"Transportation"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/situational-ethics","display_name":"Situational ethics","score":0.763700008392334},{"id":"https://openalex.org/keywords/tensor-decomposition","display_name":"Tensor decomposition","score":0.6712999939918518},{"id":"https://openalex.org/keywords/tensor","display_name":"Tensor (intrinsic definition)","score":0.6100999712944031},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.565500020980835},{"id":"https://openalex.org/keywords/dynamics","display_name":"Dynamics (music)","score":0.5221999883651733},{"id":"https://openalex.org/keywords/decomposition","display_name":"Decomposition","score":0.4975000023841858},{"id":"https://openalex.org/keywords/crime-prevention","display_name":"Crime prevention","score":0.421099990606308},{"id":"https://openalex.org/keywords/situation-awareness","display_name":"Situation awareness","score":0.30880001187324524}],"concepts":[{"id":"https://openalex.org/C9114305","wikidata":"https://www.wikidata.org/wiki/Q1428317","display_name":"Situational ethics","level":2,"score":0.763700008392334},{"id":"https://openalex.org/C2986737658","wikidata":"https://www.wikidata.org/wiki/Q30103009","display_name":"Tensor decomposition","level":3,"score":0.6712999939918518},{"id":"https://openalex.org/C155281189","wikidata":"https://www.wikidata.org/wiki/Q3518150","display_name":"Tensor (intrinsic definition)","level":2,"score":0.6100999712944031},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5702000260353088},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.565500020980835},{"id":"https://openalex.org/C145912823","wikidata":"https://www.wikidata.org/wiki/Q113558","display_name":"Dynamics (music)","level":2,"score":0.5221999883651733},{"id":"https://openalex.org/C124681953","wikidata":"https://www.wikidata.org/wiki/Q339062","display_name":"Decomposition","level":2,"score":0.4975000023841858},{"id":"https://openalex.org/C2776348852","wikidata":"https://www.wikidata.org/wiki/Q855848","display_name":"Crime prevention","level":2,"score":0.421099990606308},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4018999934196472},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3465999960899353},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.31450000405311584},{"id":"https://openalex.org/C145804949","wikidata":"https://www.wikidata.org/wiki/Q478123","display_name":"Situation awareness","level":2,"score":0.30880001187324524},{"id":"https://openalex.org/C79487989","wikidata":"https://www.wikidata.org/wiki/Q934680","display_name":"Vehicle dynamics","level":2,"score":0.3084999918937683},{"id":"https://openalex.org/C14911803","wikidata":"https://www.wikidata.org/wiki/Q7532148","display_name":"Situation analysis","level":2,"score":0.2987000048160553},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.2985999882221222},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2955000102519989},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.295199990272522},{"id":"https://openalex.org/C2992490269","wikidata":"https://www.wikidata.org/wiki/Q83267","display_name":"Criminal behavior","level":2,"score":0.29490000009536743},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.26499998569488525},{"id":"https://openalex.org/C3017944768","wikidata":"https://www.wikidata.org/wiki/Q1450463","display_name":"Poison control","level":2,"score":0.2623000144958496},{"id":"https://openalex.org/C2776876444","wikidata":"https://www.wikidata.org/wiki/Q2845200","display_name":"Crime analysis","level":2,"score":0.2547999918460846}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcss.2025.3634984","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcss.2025.3634984","pdf_url":null,"source":{"id":"https://openalex.org/S2490693980","display_name":"IEEE Transactions on Computational Social Systems","issn_l":"2329-924X","issn":["2329-924X","2373-7476"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computational Social Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7850309014320374,"display_name":"Sustainable cities and communities","id":"https://metadata.un.org/sdg/11"}],"awards":[{"id":"https://openalex.org/G1692788248","display_name":null,"funder_award_id":"2682024CX053","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G848726259","display_name":null,"funder_award_id":"72301144","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8686129653","display_name":null,"funder_award_id":"72172057","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8807344925","display_name":null,"funder_award_id":"72401110","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8811881147","display_name":null,"funder_award_id":"U2468207","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Understanding":[0],"the":[1,39,49,119,122,130,134,137,171,184,196,220],"spatiotemporal":[2,164],"characteristics":[3],"of":[4,38,55,86,136,173,222],"criminal":[5,56,127,167],"activities":[6,57,128,168],"in":[7,51,201],"a":[8,72,96,178],"city,":[9],"or":[10],"urban":[11,26,87,204],"crime":[12,23,88,101,144,205,212],"dynamics":[13,174,206],"for":[14,18,82],"short,":[15],"is":[16,192],"essential":[17],"developing":[19],"ways":[20,50],"to":[21,34,44,99,108,139,169,194],"control":[22],"and":[24,62,112,154],"improve":[25],"safety.":[27],"While":[28],"much":[29],"effort":[30],"has":[31],"been":[32],"devoted":[33],"this":[35,67,69],"field,":[36],"most":[37],"existing":[40],"studies":[41],"have":[42],"led":[43],"overly":[45],"generalized":[46],"findings,":[47],"obscuring":[48],"which":[52,103,140,199],"dynamic":[53],"patterns":[54],"vary":[58],"by":[59,175],"place,":[60],"time,":[61],"situational":[63,157],"context.":[64],"To":[65],"address":[66],"challenge,":[68],"article":[70],"proposes":[71],"novel":[73],"space-time-context-aware":[74],"tensor":[75,98,131],"decomposition":[76],"framework,":[77],"namely":[78],"<monospace":[79,91,160,223],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[80,92,161,224],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">STCTD-Crime</monospace>,":[81],"an":[83,105,187,202],"in-depth":[84],"understanding":[85,172],"dynamics.":[89],"Specifically,":[90],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">STCTD-Crime</monospace>":[93,162],"first":[94],"constructs":[95],"third-order":[97],"represent":[100],"data,":[102],"provides":[104],"elegant":[106],"way":[107],"model":[109],"spatial,":[110],"temporal,":[111],"contextual":[113],"factors":[114,124],"simultaneously.":[115],"Then,":[116],"it":[117],"decouples":[118],"influence":[120],"that":[121],"three":[123],"exerts":[125],"on":[126,211],"via":[129],"decomposition,":[132],"enabling":[133],"observation":[135],"extent":[138],"each":[141],"factor":[142],"affects":[143],"incidents":[145],"occurring":[146],"at":[147],"different":[148,151,156],"regions,":[149],"within":[150],"time":[152],"slices,":[153],"under":[155],"contexts.":[158],"Moreover,":[159],"exploits":[163],"correlations":[165],"between":[166],"facilitate":[170],"seamlessly":[176],"integrating":[177],"crime-number-guided":[179],"correlation":[180],"learning":[181],"method":[182],"into":[183],"framework.":[185],"Finally,":[186],"alternating":[188],"optimization":[189,197],"based":[190],"scheme":[191],"developed":[193],"solve":[195],"problem,":[198],"results":[200],"efficient":[203],"discovery":[207],"procedure.":[208],"Extensive":[209],"analyses":[210],"datasets":[213],"drawn":[214],"from":[215],"real-world":[216],"sources":[217],"convincingly":[218],"demonstrate":[219],"effectiveness":[221],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">STCTD-Crime</monospace>.":[225]},"counts_by_year":[],"updated_date":"2026-04-03T16:38:21.277918","created_date":"2025-12-31T00:00:00"}
