Actionable Objective Optimization for Suspicious Behavior Detection on Large Bipartite Graphs
暂无分享,去创建一个
[1] Charalampos E. Tsourakakis. The K-clique Densest Subgraph Problem , 2015, WWW.
[2] Christos Faloutsos,et al. BIRDNEST: Bayesian Inference for Ratings-Fraud Detection , 2015, SDM.
[3] Justin Zhan,et al. Uncovering Suspicious Activity From Partially Paired and Incomplete Multimodal Data , 2017, IEEE Access.
[4] Jianzhong Li,et al. Mining Frequent Subgraph Patterns from Uncertain Graph Data , 2010, IEEE Transactions on Knowledge and Data Engineering.
[5] Christos Faloutsos,et al. Suspicious Behavior Detection: Current Trends and Future Directions , 2016, IEEE Intelligent Systems.
[6] Christos Faloutsos,et al. DenseAlert: Incremental Dense-Subtensor Detection in Tensor Streams , 2017, KDD.
[7] Christos Faloutsos,et al. CatchSync: catching synchronized behavior in large directed graphs , 2014, KDD.
[8] Samir Khuller,et al. On Finding Dense Subgraphs , 2009, ICALP.
[9] Venkatesan Guruswami,et al. CopyCatch: stopping group attacks by spotting lockstep behavior in social networks , 2013, WWW.
[10] Dimitrios M. Thilikos,et al. Evaluating Cooperation in Communities with the k-Core Structure , 2011, 2011 International Conference on Advances in Social Networks Analysis and Mining.
[11] Christos Faloutsos,et al. CoreScope: Graph Mining Using k-Core Analysis — Patterns, Anomalies and Algorithms , 2016, 2016 IEEE 16th International Conference on Data Mining (ICDM).
[12] Sankar Virdhagriswaran,et al. Camouflaged fraud detection in domains with complex relationships , 2006, KDD '06.
[13] Christos Faloutsos,et al. HoloScope: Topology-and-Spike Aware Fraud Detection , 2017, CIKM.
[14] Christos Faloutsos,et al. Spotting Suspicious Behaviors in Multimodal Data: A General Metric and Algorithms , 2016, IEEE Transactions on Knowledge and Data Engineering.
[15] Charalampos E. Tsourakakis,et al. Denser than the densest subgraph: extracting optimal quasi-cliques with quality guarantees , 2013, KDD.
[16] Yousef Saad,et al. Dense Subgraph Extraction with Application to Community Detection , 2012, IEEE Transactions on Knowledge and Data Engineering.
[17] Huan Liu,et al. Online Social Spammer Detection , 2014, AAAI.
[18] Hyun Ah Song,et al. FRAUDAR: Bounding Graph Fraud in the Face of Camouflage , 2016, KDD.
[19] Jure Leskovec,et al. Community Interaction and Conflict on the Web , 2018, WWW.
[20] Soroush Vosoughi,et al. Rumor Gauge , 2017, ACM Trans. Knowl. Discov. Data.
[21] Chao Liu,et al. Mining Behavior Graphs for "Backtrace" of Noncrashing Bugs , 2005, SDM.
[22] Silvio Lattanzi,et al. Efficient Densest Subgraph Computation in Evolving Graphs , 2015, WWW.
[23] Christos Faloutsos,et al. D-Cube: Dense-Block Detection in Terabyte-Scale Tensors , 2017, WSDM.
[24] Christopher M. Danforth,et al. Temporal Patterns of Happiness and Information in a Global Social Network: Hedonometrics and Twitter , 2011, PloS one.
[25] Christos Faloutsos,et al. Netprobe: a fast and scalable system for fraud detection in online auction networks , 2007, WWW '07.
[26] Christos Faloutsos,et al. Opinion Fraud Detection in Online Reviews by Network Effects , 2013, ICWSM.
[27] Christos Faloutsos,et al. MultiAspectForensics: Pattern Mining on Large-Scale Heterogeneous Networks with Tensor Analysis , 2011, 2011 International Conference on Advances in Social Networks Analysis and Mining.
[28] Krishna P. Gummadi,et al. Understanding and combating link farming in the twitter social network , 2012, WWW.
[29] Aristides Gionis,et al. Top-k overlapping densest subgraphs , 2016, Data Mining and Knowledge Discovery.
[30] Christos Faloutsos,et al. EigenSpokes: Surprising Patterns and Scalable Community Chipping in Large Graphs , 2010, PAKDD.
[31] Christos Faloutsos,et al. Inferring lockstep behavior from connectivity pattern in large graphs , 2016, Knowledge and Information Systems.
[32] Nitesh V. Chawla,et al. Multi-Type Itemset Embedding for Learning Behavior Success , 2018, KDD.
[33] Emmanuel Müller,et al. Focused clustering and outlier detection in large attributed graphs , 2014, KDD.
[34] Fenglong Ma,et al. Discovering social spammers from multiple views , 2017, Neurocomputing.
[35] Christos Faloutsos,et al. Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective , 2014, 2014 IEEE International Conference on Data Mining.