Fraud Detection in Dynamic Interaction Network
暂无分享,去创建一个
Hao Lin | Yuan Zuo | Hong Li | Xin Wan | Guannan Liu | Junjie Wu | Junjie Wu | Guannan Liu | Xin Wan | Hao Lin | Hong Li | Y. Zuo
[1] C. Faloutsos,et al. EVENT DETECTION IN TIME SERIES OF MOBILE COMMUNICATION GRAPHS , 2010 .
[2] Rose Yu,et al. GLAD: group anomaly detection in social media analysis , 2014, ACM Trans. Knowl. Discov. Data.
[3] Mark Johnson,et al. Why Doesn’t EM Find Good HMM POS-Taggers? , 2007, EMNLP.
[4] Vipin Kumar,et al. Anomaly Detection for Discrete Sequences: A Survey , 2012, IEEE Transactions on Knowledge and Data Engineering.
[5] Vipin Kumar,et al. Comparative Evaluation of Anomaly Detection Techniques for Sequence Data , 2008, 2008 Eighth IEEE International Conference on Data Mining.
[6] Barnabás Póczos,et al. Hierarchical Probabilistic Models for Group Anomaly Detection , 2011, AISTATS.
[7] Ashok N. Srivastava,et al. Anomaly Detection and Diagnosis Algorithms for Discrete Symbol Sequences with Applications to Airline Safety , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[8] Christopher M. Bishop,et al. Pattern Recognition and Machine Learning (Information Science and Statistics) , 2006 .
[9] Emmanuel Müller,et al. Focused clustering and outlier detection in large attributed graphs , 2014, KDD.
[10] Philip S. Yu,et al. Colibri: fast mining of large static and dynamic graphs , 2008, KDD.
[11] Jimeng Sun,et al. Beyond streams and graphs: dynamic tensor analysis , 2006, KDD '06.
[12] Phillip Bonacich,et al. Eigenvector-like measures of centrality for asymmetric relations , 2001, Soc. Networks.
[13] Ali Taylan Cemgil,et al. Bayesian Inference for Nonnegative Matrix Factorisation Models , 2009, Comput. Intell. Neurosci..
[14] David M. Blei,et al. Scalable Recommendation with Hierarchical Poisson Factorization , 2015, UAI.
[15] Xiao Liu,et al. A Network Embedding Based Approach for Telecommunications Fraud Detection , 2018, CDVE.
[16] Phil Blunsom,et al. Collapsed Variational Bayesian Inference for Hidden Markov Models , 2013, AISTATS.
[17] Klemens Böhm,et al. Ranking outlier nodes in subspaces of attributed graphs , 2013, 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW).
[18] Michael I. Jordan,et al. Latent Dirichlet Allocation , 2001, J. Mach. Learn. Res..
[19] Ming-Syan Chen,et al. Mining the Networks of Telecommunication Fraud Groups using Social Network Analysis , 2017, ASONAM.
[20] Nikos D. Sidiropoulos,et al. ParCube: Sparse Parallelizable Tensor Decompositions , 2012, ECML/PKDD.
[21] Barnabás Póczos,et al. Group Anomaly Detection using Flexible Genre Models , 2011, NIPS.
[22] Arindam Banerjee,et al. Semi-Markov Switching Vector Autoregressive Model-Based Anomaly Detection in Aviation Systems , 2016, J. Aerosp. Inf. Syst..
[23] Katrien van Driessen,et al. A Fast Algorithm for the Minimum Covariance Determinant Estimator , 1999, Technometrics.
[24] Philip S. Yu,et al. GraphScope: parameter-free mining of large time-evolving graphs , 2007, KDD '07.
[25] Luming Zhang,et al. GMove: Group-Level Mobility Modeling Using Geo-Tagged Social Media , 2016, KDD.
[26] Ananthram Swami,et al. Discovery of “comet” communities in temporal and labeled graphs Com$$^2$$2 , 2015, Knowledge and Information Systems.
[27] Steve Harenberg,et al. Anomaly detection in dynamic networks: a survey , 2015 .
[28] Hans-Peter Kriegel,et al. LOF: identifying density-based local outliers , 2000, SIGMOD '00.
[29] Ming Gao,et al. BiRank: Towards Ranking on Bipartite Graphs , 2017, IEEE Transactions on Knowledge and Data Engineering.
[30] Julian Besag,et al. An Introduction to Markov Chain Monte Carlo Methods , 2004 .
[31] Bernhard Schölkopf,et al. Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.
[32] David J. Miller,et al. ATD: Anomalous Topic Discovery in High Dimensional Discrete Data , 2015, IEEE Transactions on Knowledge and Data Engineering.
[33] Fei Tony Liu,et al. Isolation-Based Anomaly Detection , 2012, TKDD.
[34] Jianfeng Gao,et al. A comparison of Bayesian estimators for unsupervised Hidden Markov Model POS taggers , 2008, EMNLP.
[35] Christos Faloutsos,et al. Netprobe: a fast and scalable system for fraud detection in online auction networks , 2007, WWW '07.
[36] Danai Koutra,et al. RolX: structural role extraction & mining in large graphs , 2012, KDD.
[37] Danai Koutra,et al. TensorSplat: Spotting Latent Anomalies in Time , 2012, 2012 16th Panhellenic Conference on Informatics.
[38] Alex Bateman,et al. An introduction to hidden Markov models. , 2007, Current protocols in bioinformatics.
[39] Ryan A. Rossi,et al. Modeling dynamic behavior in large evolving graphs , 2013, WSDM.
[40] Dominik Olszewski. Employing Kullback-Leibler divergence and Latent Dirichlet Allocation for fraud detection in telecommunications , 2012, Intell. Data Anal..
[41] Thomas L. Griffiths,et al. Bayesian Inference for PCFGs via Markov Chain Monte Carlo , 2007, NAACL.
[42] Mark A. Girolami,et al. Employing Latent Dirichlet Allocation for fraud detection in telecommunications , 2007, Pattern Recognit. Lett..
[43] Curtis B. Storlie,et al. Scan statistics for the online discovery of locally anomalous subgraphs , 2011 .
[44] Thomas L. Griffiths,et al. A fully Bayesian approach to unsupervised part-of-speech tagging , 2007, ACL.