Outlier and anomalous behavior detection in social networks using constraint programming
暂无分享,去创建一个
Imade Benelallam | El-Houssine Bouyakhf | Nabila Zrira | Soufiana Mekouar | El Mehdi El Graoui | E. Bouyakhf | Nabila Zrira | I. Benelallam | Soufiana Mekouar | E. Graoui | Imade Benelallam
[1] D. Hand,et al. Bayesian anomaly detection methods for social networks , 2010, 1011.1788.
[2] Teofilo F. Gonzalez,et al. P-Complete Approximation Problems , 1976, J. ACM.
[3] Danai Koutra,et al. Graph based anomaly detection and description: a survey , 2014, Data Mining and Knowledge Discovery.
[4] Jean-Charles Régin,et al. A Filtering Algorithm for Constraints of Difference in CSPs , 1994, AAAI.
[5] Jiawei Han,et al. Community Distribution Outlier Detection in Heterogeneous Information Networks , 2013, ECML/PKDD.
[6] P. V. Beek,et al. A fast and simple algorithm for bounds consistency of the all different constraint , 2003, IJCAI 2003.
[7] Fosca Giannotti,et al. Finding redundant and complementary communities in multidimensional networks , 2011, CIKM '11.
[8] Nirvana Meratnia,et al. Outlier Detection Techniques for Wireless Sensor Networks: A Survey , 2008, IEEE Communications Surveys & Tutorials.
[9] Mario Vento,et al. A (sub)graph isomorphism algorithm for matching large graphs , 2004, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[10] Hans-Peter Kriegel,et al. Local outlier detection reconsidered: a generalized view on locality with applications to spatial, video, and network outlier detection , 2012, Data Mining and Knowledge Discovery.
[11] Jun Gao,et al. A Scalable Algorithm for Detecting Community Outliers in Social Networks , 2012, WAIM.
[12] M. Newman,et al. The structure of scientific collaboration networks. , 2000, Proceedings of the National Academy of Sciences of the United States of America.
[13] Edward M. Reingold,et al. Backtrack programming techniques , 1975, CACM.
[14] Salvatore J. Stolfo,et al. A Geometric Framework for Unsupervised Anomaly Detection , 2002, Applications of Data Mining in Computer Security.
[15] Paul Shaw,et al. Using Constraint Programming and Local Search Methods to Solve Vehicle Routing Problems , 1998, CP.
[16] Christos Faloutsos,et al. oddball: Spotting Anomalies in Weighted Graphs , 2010, PAKDD.
[17] Christos Faloutsos,et al. Graph evolution: Densification and shrinking diameters , 2006, TKDD.
[18] Donald W. Loveland,et al. A machine program for theorem-proving , 2011, CACM.
[19] Christophe Rigotti,et al. Finding Collections of k-Clique Percolated Components in Attributed Graphs , 2012, PAKDD.
[20] Yizhou Sun,et al. On community outliers and their efficient detection in information networks , 2010, KDD.
[21] Solomon W. Golomb,et al. Backtrack Programming , 1965, JACM.
[22] Talel Abdessalem,et al. Casting a web of trust over Wikipedia: an interaction-based approach , 2011, WWW.
[23] Hans-Peter Kriegel,et al. A survey on unsupervised outlier detection in high‐dimensional numerical data , 2012, Stat. Anal. Data Min..
[24] Philip S. Yu,et al. Outlier detection in graph streams , 2011, 2011 IEEE 27th International Conference on Data Engineering.
[25] Vipin Kumar,et al. Algorithms for Constraint-Satisfaction Problems: A Survey , 1992, AI Mag..
[26] Klemens Böhm,et al. Ranking outlier nodes in subspaces of attributed graphs , 2013, 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW).
[27] Lawrence B. Holder,et al. Discovering Structural Anomalies in Graph-Based Data , 2007, Seventh IEEE International Conference on Data Mining Workshops (ICDMW 2007).
[28] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[29] Vic Barnett,et al. Outliers in Statistical Data , 1980 .