Efficient Top-k Vulnerable Nodes Detection in Uncertain Graphs
暂无分享,去创建一个
[1] Yanping Wu,et al. Edge Manipulation Approaches for K-Core Minimization: Metrics and Analytics , 2023, IEEE Transactions on Knowledge and Data Engineering.
[2] Zhibin Niu,et al. Delinquent Events Prediction in Temporal Networked-Guarantee Loans , 2020, IEEE Transactions on Neural Networks and Learning Systems.
[3] Dawei Cheng,et al. Contagious Chain Risk Rating for Networked-guarantee Loans , 2020, KDD.
[4] Ying Zhang,et al. Risk Guarantee Prediction in Networked-Loans , 2020, IJCAI.
[5] Zhibin Niu,et al. iConViz: Interactive Visual Exploration of the Default Contagion Risk of Networked-Guarantee Loans , 2020, 2020 IEEE Conference on Visual Analytics Science and Technology (VAST).
[6] Dawei Cheng,et al. Risk Assessment for Networked-guarantee Loans Using High-order Graph Attention Representation , 2019, IJCAI.
[7] Fei Tan,et al. A Deep Learning Approach to Competing Risks Representation in Peer-to-Peer Lending , 2019, IEEE Transactions on Neural Networks and Learning Systems.
[8] Arijit Khan,et al. An In-Depth Comparison of s-t Reliability Algorithms over Uncertain Graphs , 2019, Proc. VLDB Endow..
[9] Jeffrey Xu Yu,et al. Improved Algorithms for Maximal Clique Search in Uncertain Networks , 2019, 2019 IEEE 35th International Conference on Data Engineering (ICDE).
[10] Yuchen Li,et al. Influence Maximization on Social Graphs: A Survey , 2018, IEEE Transactions on Knowledge and Data Engineering.
[11] Piet Van Mieghem,et al. Nodal vulnerability to targeted attacks in power grids , 2018, Applied Network Science.
[12] Dawei Cheng,et al. Prediction Defaults for Networked-guarantee Loans , 2017, 2018 24th International Conference on Pattern Recognition (ICPR).
[13] Francesco Bonchi,et al. Conditional Reliability in Uncertain Graphs , 2016, IEEE Transactions on Knowledge and Data Engineering.
[14] Tie-Yan Liu,et al. LightGBM: A Highly Efficient Gradient Boosting Decision Tree , 2017, NIPS.
[15] Xiaoyang Wang,et al. Identifying Top-K Influential Nodes in Networks , 2017, CIKM.
[16] Xuemin Lin,et al. Bring Order into the Samples: A Novel Scalable Method for Influence Maximization , 2017, IEEE Transactions on Knowledge and Data Engineering.
[17] Ei Ei Thu,et al. Transforming Model Oriented Program into Android Source Code Based on Drools Rule Engine , 2017 .
[18] Xuemin Lin,et al. Efficient Distance-Aware Influence Maximization in Geo-Social Networks , 2017, IEEE Transactions on Knowledge and Data Engineering.
[19] Lei Zheng,et al. Joint Deep Modeling of Users and Items Using Reviews for Recommendation , 2017, WSDM.
[20] Liqing Zhang,et al. Credit Card Fraud Detection Using Convolutional Neural Networks , 2016, ICONIP.
[21] Heng-Tze Cheng,et al. Wide & Deep Learning for Recommender Systems , 2016, DLRS@RecSys.
[22] Xuemin Lin,et al. Efficient Probabilistic Supergraph Search , 2016, IEEE Transactions on Knowledge and Data Engineering.
[23] Qiang Yang,et al. The Lifecycle and Cascade of WeChat Social Messaging Groups , 2015, WWW.
[24] Xiaokui Xiao,et al. Influence Maximization in Near-Linear Time: A Martingale Approach , 2015, SIGMOD Conference.
[25] Kartik Anand,et al. Filling in the blanks: network structure and interbank contagion , 2014, SSRN Electronic Journal.
[26] Spiros Bougheas,et al. Complex Financial Networks and Systemic Risk: A Review , 2014, SSRN Electronic Journal.
[27] Jian Xu,et al. A Forensic Analysis Method for Redis Database based on RDB and AOF File , 2014, J. Comput..
[28] Arunabha Sen,et al. Identification of K most vulnerable nodes in multi-layered network using a new model of interdependency , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[29] Christian Borgs,et al. Maximizing Social Influence in Nearly Optimal Time , 2012, SODA.
[30] Aristides Gionis,et al. Fast Reliability Search in Uncertain Graphs , 2014, EDBT.
[31] Yan Jia,et al. Identifying Vulnerable Nodes of Complex Networks in Cascading Failures Induced by Node-Based Attacks , 2013 .
[32] Véronique Van Vlasselaer,et al. Using social network knowledge for detecting spider constructions in social security fraud , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).
[33] Tamir Tassa,et al. Injecting Uncertainty in Graphs for Identity Obfuscation , 2012, Proc. VLDB Endow..
[34] Ming Xu,et al. Determinants of the guarantee circles: The case of Chinese listed firms , 2012 .
[35] H. Brendan McMahan,et al. Follow-the-Regularized-Leader and Mirror Descent: Equivalence Theorems and L1 Regularization , 2011, AISTATS.
[36] Haixun Wang,et al. Distance-Constraint Reachability Computation in Uncertain Graphs , 2011, Proc. VLDB Endow..
[37] B. Engelmann,et al. The Basel II risk parameters : estimation, validation, stress testing--with applications to loan risk management , 2011 .
[38] George Kollios,et al. k-nearest neighbors in uncertain graphs , 2010, Proc. VLDB Endow..
[39] Franklin Allen,et al. Financial Connections and Systemic Risk , 2010 .
[40] A. Lo,et al. Consumer Credit Risk Models Via Machine-Learning Algorithms , 2010 .
[41] W. S. Chow,et al. Social network, social trust and shared goals in organizational knowledge sharing , 2008, Inf. Manag..
[42] Edith Cohen,et al. Summarizing data using bottom-k sketches , 2007, PODC '07.
[43] Jukka-Pekka Onnela,et al. Complex networks in the study of financial and social systems , 2006 .
[44] Carl D. Meyer,et al. Deeper Inside PageRank , 2004, Internet Math..
[45] Jon Kleinberg,et al. Maximizing the spread of influence through a social network , 2003, KDD '03.
[46] Bart Baesens,et al. Using Neural Network Rule Extraction and Decision Tables for Credit - Risk Evaluation , 2003, Manag. Sci..
[47] David J. Hand,et al. Statistical Classification Methods in Consumer Credit Scoring: a Review , 1997 .
[48] Serge Abiteboul,et al. On the representation and querying of sets of possible worlds , 1987, SIGMOD '87.
[49] G. Masters. A rasch model for partial credit scoring , 1982 .