{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T12:04:08Z","timestamp":1773317048970,"version":"3.50.1"},"reference-count":67,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["#1054389"],"award-info":[{"award-number":["#1054389"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["#1544455"],"award-info":[{"award-number":["#1544455"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["#1652525"],"award-info":[{"award-number":["#1652525"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["#1618448"],"award-info":[{"award-number":["#1618448"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000002","name":"National Institutes of Health","doi-asserted-by":"publisher","award":["NICHD 1K01-HD093863-01"],"award-info":[{"award-number":["NICHD 1K01-HD093863-01"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Penn State University's Population Research Institute","award":["NICHD R24-HD041025"],"award-info":[{"award-number":["NICHD R24-HD041025"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Big Data"],"published-print":{"date-parts":[[2019,6,1]]},"DOI":"10.1109\/tbdata.2017.2786405","type":"journal-article","created":{"date-parts":[[2017,12,22]],"date-time":"2017-12-22T19:57:41Z","timestamp":1513972661000},"page":"180-194","source":"Crossref","is-referenced-by-count":37,"title":["Non-Stationary Model for Crime Rate Inference Using Modern Urban Data"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7918-4548","authenticated-orcid":false,"given":"Hongjian","family":"Wang","sequence":"first","affiliation":[]},{"given":"Huaxiu","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Kifer","sequence":"additional","affiliation":[]},{"given":"Corina","family":"Graif","sequence":"additional","affiliation":[]},{"given":"Zhenhui","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9671.2010.01194.x"},{"key":"ref38","article-title":"Mapping crime: Understanding hotspots","author":"eck","year":"2005"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2663204.2663254"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1007\/978-3-319-13734-6_29","article-title":"Mining mobile phone data to investigate urban crime theories at scale","author":"traunmueller","year":"2014","journal-title":"Social Informatics"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2014.02.003"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/978-3-642-29047-3_28","article-title":"Automatic crime prediction using events extracted from twitter posts","author":"wang","year":"2012","journal-title":"Social Computing, Behavioral - Cultural Modeling and Prediction"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.sj.8350066"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1142\/S0218202508003029"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1989734.1989742"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1177\/0022427806286566"},{"key":"ref60","doi-asserted-by":"crossref","first-page":"918","DOI":"10.1126\/science.277.5328.918","article-title":"Neighborhoods and violent crime: A multilevel study of collective efficacy","volume":"277","author":"sampson","year":"1997","journal-title":"Sci"},{"key":"ref62","article-title":"Foursquare venues service","year":"2015"},{"key":"ref61","year":"1993","journal-title":"R J Bursik and H G Grasmick Neighborhoods and Crime The Dimensions of Effective Community Control Richard Rosenfeld University of Missouri-St Louis Lexington Books"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.15288\/jsa.2001.62.628"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-9125.1991.tb01087.x"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1111\/j.1536-7150.1988.tb02025.x"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804618"},{"key":"ref65","first-page":"213","article-title":"Spatial analyses of crime","volume":"4","author":"anselin","year":"2000","journal-title":"Criminal Justice"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1093\/sf\/76.1.31"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"3529","DOI":"10.1016\/S1573-4463(99)30043-2","article-title":"The economics of crime","volume":"3","author":"freeman","year":"1999","journal-title":"Handbook of Labor Economics"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741675"},{"key":"ref2","article-title":"Criminal victimization, 2014","author":"truman","year":"2015"},{"key":"ref1","article-title":"Rates of violent victimizations, 1993&#x2013;2015&#x201D; and &#x201C;rates of property victimizations, 1993&#x2013;2015","year":"2016","journal-title":"Generated using the NCVS Victimization Analysis Tool"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1644038.1644048"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2488188"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2996913.2996943"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1198\/jasa.2011.ap09546"},{"key":"ref23","first-page":"715","article-title":"Diagnosing New York City's noises with ubiquitous data","author":"zheng","year":"2014","journal-title":"Proc ACM Int Joint Conf Pervasive Ubiquitous Comput"},{"key":"ref26","first-page":"313","article-title":"On the relation between education and crime","author":"ehrlich","year":"1975","journal-title":"Education Income and Human Behavior"},{"key":"ref25","article-title":"Learning to detect patterns of crime","author":"wang","year":"2013","journal-title":"Machine Learning and Knowledge Discovery in Databases"},{"key":"ref50","article-title":"City of Chicago data portal","year":"2015"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.118.3.392"},{"key":"ref59","article-title":"Decennial census","year":"2010"},{"key":"ref58","author":"jacobs","year":"1961","journal-title":"The Death and Life of Great American Cities"},{"key":"ref57","first-page":"4","article-title":"The story of the crime: Functional, temporal and spatial tendencies in street robbery","author":"sahbaz","year":"2007","journal-title":"6th Int Space Syntax Symp"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.landurbplan.2012.08.006"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1177\/073401689301800203"},{"key":"ref54","author":"fotheringham","year":"2003","journal-title":"Geographically Weighted Regression The Analysis of Spatially Varying Relationships"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007521427059"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.2307\/1269547"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339561"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1111\/soc4.12199"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1938606.1938608"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2307\/2094589"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/BF02242925"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939736"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2010.5624994"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2010.2074196"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.07.069"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2010.10.005"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2010.2090521"},{"key":"ref4","article-title":"Toward a geographically extended perspective of neighborhood effects on children's victimization","author":"graif","year":"2015","journal-title":"annual meetings of the American Society of Criminology"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1001\/jamapediatrics.2013.42"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1177\/1088767909336728"},{"key":"ref5","article-title":"A tale of 3 cities: La and nyc outpace chicago in curbing violence","author":"tribune","year":"2015"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2629592"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1111\/j.1574-0862.2002.tb00120.x"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1177\/0002764209331527"},{"key":"ref9","first-page":"1","article-title":"Crime places in crime theory","volume":"4","author":"eck","year":"2015","journal-title":"Crime and Place Crime Prevention Studies"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2014.2354673"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/BF01093416"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1002\/qj.2188"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.apgeog.2013.04.002"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/BF00889887"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1080\/02693799008941549"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1002\/joc.3370140107"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/0016-7061(95)00011-C"}],"container-title":["IEEE Transactions on Big Data"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielaam\/6687317\/8726180\/8234616-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6687317\/8726180\/08234616.pdf?arnumber=8234616","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:55:28Z","timestamp":1657745728000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8234616\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,1]]},"references-count":67,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tbdata.2017.2786405","relation":{},"ISSN":["2332-7790","2372-2096"],"issn-type":[{"value":"2332-7790","type":"electronic"},{"value":"2372-2096","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,1]]}}}