IEEE has now retracted eight papers involving Memon, seven of them on the basis of the VroniPlag Wiki documentation:
- "Detecting New Trends in Terrorist Networks," by Uffe Kock Wiil, Nasrullah Memon, and Panagiotis Karampelas in the Proceedings of the 2010 International Conference on Advances in Social Networks Analysis and Mining (ASONAM), August 2010, pp. 435-440 is a plagiarism of "Social Network Analysis and Information Fusion for AntiTerrorism" by Pontus Svenson, Per Svensson, and Hugo Tullberg in the Proceedings of the 2006 Conference on Civil and Military Readiness (CIMI), May 2006 and Data Mining: Concepts and Techniques (second edition),
by Jiawei Han and Micheline Kamber, Morgan Kaufmann, Elsevier, 2006. The lead author, Nasrullah Memon, was found to be solely responsible for the violation.
- "Detecting High-Value Individuals in Covert Networks: 7/7 London Bombing Case Study," by Nasrullah Memon, N. Harkiolakis, and David L. Hicks in the Proceedings of the IEEE/ACS International Conference on Computer Systems and Applications, 2008, pp. 206-215.
- "Detecting Key Players in 11-M Terrorist Network: A Case Study," by Nasrullah Memon and David L. Hicks in the Proceedings of the Third International Conference on Availability, Reliability and Security, 2008, pp. 1254-1259.
- "Practical Algorithms and Mathematical Models for Destabilizing Terrorist Networks," by Nasrullah Memon, David L. Hicks, Dil Muhammad Akbar Hussain, and Hendrik Legind Larsen, in Military Communications Conference, MILCOM 2007 is a plagiarism of "Untangling Criminal Networks: A Case Study" by Jennifer Xu, Hsinchun Chen in Proceedings of the First NSF/NIJ Symposium Intelligence and Security Informatics, ISI, June 2003 and "The Exploratory Construction of Database Views" by M. N. Smith, P. J. H. King, Research Report BBKCS, School of Computer Science and Information Systems, Birbeck College, University of London, 2002. The lead author, Nasrullah Memon, was found to be solely responsible for the violation.
- "Harvesting Terrorists Information from Web," by Nasrullah Memon, David L. Hicks, and Hendrik Legind Larsen, in the Proceedings of the 11th International Conference Information Visualization (IV'07), 2007, pp. 664 - 671
- "Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network," Nasrullah Memon, K. C. Kristoffersen, David L. Hicks, and Hendrik Legind Larsen, in the Proceedings of the Second International Conference on Availability, Reliability and Security, (ARES 2007), 2007, pp. 861-870 is a plagiarism of "Clique Relaxations in Social Network Analysis: The Maximum k-plex Problem" by B. Balasundaram, S. Butenko, I. V. Hicks, S. Sachdeva
Posted online, January 2006 and "Network Analysis of Knowledge Construction in Asynchronous Learning Networks" by Aviv, Reuven; Erlich, Zippy; Ravid, Gilad; Geva, Aviva in the Journal of Asynchronous Learning Networks, Vol 7, No 3, 2003
- "Practical Approaches for Analysis, Visualization and Destabilizing Terrorist Networks," by Nasrullah Memon and Hendrik Legind Larsen in the Proceedings of the First International Conference on Availability, Reliability and Security (ARES’06), 2006, pp. 8xx - 913 is a plagiarism of the same sources as number 4.
- "Novel Algorithms for Subgroup Detection in Terrorist Networks," by Nasrullah Memon, A. R. Qureshi, Uffe Kock Wiil, and David L. Hicks in the Proceedings of the International Conference on Availability, Reliability and Security (ARES '09), 2009, pp. 572-577 is a plagiarism of "Balancing Systematic and Flexible Exploration of Social Networks" by Adam Perer, Ben Shneiderman in the IEEE Transactions on Visualization and Computer Graphics, Vol. 12, No. 5 Sept/Oct 2006, pp. 693-700 and "Mining for Offender Group Detection and Story of a Police Operation" by Fatih Ozgul, Julian Bondy, Hakan Aksoy in the Proceedings of the Sixth Australasian Data Mining Conference (AusDM 2007), Gold Coast, Australia. Conferences in Research and Practice in Information Technology (CRPIT), Vol. 70, December 2007, pp. 185-189 and Smith and King from number 4 above.
When interviewed by the Danish weekly newspaper Weekendavisen in May 2012, Memon had insinuated that dark powers had manipulated his thesis in order to discredit him. However in the face of the documented plagiarism in many other papers, it seems that a more detailed investigation into his publications needs to be mounted. The problem is, who will take action? Who has the time? It took over six months for IEEE to withdraw the publications after the plagiarism was clearly documented on VroniPlag Wiki. At least IEEE has a procedure for dealing with allegations, but it seems to take far too long, in particular because these papers have been cited, and not only in self-citations.
When will the University of Aalborg take action? Hicks, Wiil, and Larson are professors there. Hendrik Legind Larsen and Hsinchun Chen (the author of a work that was plagiarized in number 4) were members of Memon's doctoral thesis committee.When will the University of South Denmark look into the situation? Memon is advising doctoral students there, organized a conference on counterterrorism in Odense, and is a journal editor. Do the retractions have any consequences at his university?
According the the IEEE policy on good scientific practice, a level 1 violation means that > 50 % of the paper is plagiarized, resulting in a retraction notice being printed and the authors banned for 3-5 years from publishing in any IEEE publication. It seems that more than one of the papers retracted are level 1 violations. Will the publication ban be consecutive? That is, if there are 3 level 1 violations, will Memon be banned from publishing for 15 years?
I am glad that IEEE has finally taken action (and there are over 500 notices of retraction in the IEEE database). But there are so many questions raised that I fear will not be answered.