暂无分享,去创建一个
Reihaneh Rabbany | Renhao Wang | Aayushi Kulshrestha | Junhao Wang | Junhao Wang | Reihaneh Rabbany | Renhao Wang | Aayushi Kulshrestha
[1] Huan Liu,et al. Deep Anomaly Detection on Attributed Networks , 2019, SDM.
[2] Kristina Lerman,et al. Analyzing the Digital Traces of Political Manipulation: The 2016 Russian Interference Twitter Campaign , 2018, 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[3] Chuan Zhou,et al. Deep Structure Learning for Fraud Detection , 2018, 2018 IEEE International Conference on Data Mining (ICDM).
[4] Hyun Ah Song,et al. FRAUDAR: Bounding Graph Fraud in the Face of Camouflage , 2016, KDD.
[5] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[6] Ponnurangam Kumaraguru,et al. On the Dynamics of Username Changing Behavior on Twitter , 2016, CODS.
[7] Leland McInnes,et al. UMAP: Uniform Manifold Approximation and Projection for Dimension Reduction , 2018, ArXiv.
[8] Kate Starbird,et al. Assembling Strategic Narratives , 2018, Proc. ACM Hum. Comput. Interact..