-
1
-
-
84961880408
-
Suspicious behavior detection: Current trends and future directions
-
Jan. /Feb.
-
M. Jiang, P. Cui, and C. Faloutsos, "Suspicious behavior detection: Current trends and future directions, " in IEEE Intell. Syst., vol. 31, no. 1, pp. 31-39, Jan. /Feb. 2016.
-
(2016)
IEEE Intell. Syst.
, vol.31
, Issue.1
, pp. 31-39
-
-
Jiang, M.1
Cui, P.2
Faloutsos, C.3
-
2
-
-
84907030580
-
Catchsync: Catching synchronized behavior in large directed graphs
-
M. Jiang, P. Cui, A. Beutel, C. Faloutsos, and S. Yang, "Catchsync: Catching synchronized behavior in large directed graphs, " in Proc. ACM SIGKDD, 2014, pp. 941-950.
-
(2014)
Proc. ACM SIGKDD
, pp. 941-950
-
-
Jiang, M.1
Cui, P.2
Beutel, A.3
Faloutsos, C.4
Yang, S.5
-
3
-
-
84936932106
-
Spotting suspicious link behavior with fBox: An adversarial perspective
-
N. Shah, A. Beutel, B. Gallagher, and C. Faloutsos, "Spotting suspicious link behavior with fBox: An adversarial perspective, " in Proc. IEEE Int. Conf. Data Mining, 2014, pp. 959-964.
-
(2014)
Proc. IEEE Int. Conf. Data Mining
, pp. 959-964
-
-
Shah, N.1
Beutel, A.2
Gallagher, B.3
Faloutsos, C.4
-
4
-
-
84893095820
-
Copycatch: Stopping group attacks by spotting lockstep behavior in social networks
-
A. Beutel, W. Xu, V. Guruswami, C. Palow, and C. Faloutsos, "Copycatch: Stopping group attacks by spotting lockstep behavior in social networks, " in Proc. 22nd Int. Conf. World Wide Web, 2013, pp. 119-130.
-
(2013)
Proc. 22nd Int. Conf. World Wide Web
, pp. 119-130
-
-
Beutel, A.1
Xu, W.2
Guruswami, V.3
Palow, C.4
Faloutsos, C.5
-
5
-
-
35348860262
-
Netprobe: A fast and scalable systemfor fraud detection in online auction networks
-
S. Pandit, D. H. Chau, S. Wang, and C. Faloutsos, "Netprobe: A fast and scalable systemfor fraud detection in online auction networks, " in Proc. 16th Int. Conf. WorldWideWeb, 2007, pp. 201-210.
-
(2007)
Proc. 16th Int. Conf. WorldWideWeb
, pp. 201-210
-
-
Pandit, S.1
Chau, D.H.2
Wang, S.3
Faloutsos, C.4
-
6
-
-
80052744565
-
Multiaspectforensics: Pattern mining on large-scale heterogeneous networks with tensor analysis
-
K. Maruhashi, F. Guo, and C. Faloutsos, "Multiaspectforensics: Pattern mining on large-scale heterogeneous networks with tensor analysis, " in Proc. Int. Conf. Adv. Social Netw. Anal. Mining, 2011, pp. 203-210.
-
(2011)
Proc. Int. Conf. Adv. Social Netw. Anal. Mining
, pp. 203-210
-
-
Maruhashi, K.1
Guo, F.2
Faloutsos, C.3
-
7
-
-
84901281683
-
Malspot: Multi2 malicious network behavior patterns analysis
-
H.-H. Mao, C.-J. Wu, E. E. Papalexakis, C. Faloutsos, K.-C. Lee, and T.-C. Kao, "Malspot: Multi2 malicious network behavior patterns analysis, " in Proc. 18th Pacific-Asia Conf. Adv. Knowl. Discovery Data Mining, 2014, pp. 1-14.
-
(2014)
Proc. 18th Pacific-Asia Conf. Adv. Knowl. Discovery Data Mining
, pp. 1-14
-
-
Mao, H.-H.1
Wu, C.-J.2
Papalexakis, E.E.3
Faloutsos, C.4
Lee, K.-C.5
Kao, T.-C.6
-
8
-
-
84860868145
-
Spotting fake reviewer groups in consumer reviews
-
A. Mukherjee, B. Liu, and N. Glance, "Spotting fake reviewer groups in consumer reviews, " in Proc. 21st Int. Conf. World Wide Web, 2012, pp. 191-200.
-
(2012)
Proc. 21st Int. Conf. World Wide Web
, pp. 191-200
-
-
Mukherjee, A.1
Liu, B.2
Glance, N.3
-
10
-
-
84901261504
-
Inferring strange behavior from connectivity pattern in social networks
-
M. Jiang, P. Cui, A. Beutel, C. Faloutsos, and S. Yang, "Inferring strange behavior from connectivity pattern in social networks, " in Proc. 18th Pacific-Asia Conf. Adv. Knowl. Discovery Data Mining, 2014, pp. 126-138.
-
(2014)
Proc. 18th Pacific-Asia Conf. Adv. Knowl. Discovery Data Mining
, pp. 126-138
-
-
Jiang, M.1
Cui, P.2
Beutel, A.3
Faloutsos, C.4
Yang, S.5
-
11
-
-
32344444324
-
On mining cross-graph quasicliques
-
J. Pei, D. Jiang, and A. Zhang, "On mining cross-graph quasicliques, " in Proc. 11th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2005, pp. 228-238.
-
(2005)
Proc. 11th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining
, pp. 228-238
-
-
Pei, J.1
Jiang, D.2
Zhang, A.3
-
12
-
-
84861732705
-
Dense subgraph extraction with application to community detection
-
Jul.
-
J. Chen and Y. Saad, "Dense subgraph extraction with application to community detection, " in IEEE Trans. Knowl. Data Eng., vol. 24, no. 7, pp. 1216-1230, Jul. 2012.
-
(2012)
IEEE Trans. Knowl. Data Eng.
, vol.24
, Issue.7
, pp. 1216-1230
-
-
Chen, J.1
Saad, Y.2
-
13
-
-
84928713623
-
Finding subgraphs with maximum total density and limited overlap
-
O. D. Balalau, F. Bonchi, T. Chan, F. Gullo, and M. Sozio, "Finding subgraphs with maximum total density and limited overlap, " in Proc. 11th ACMInt. Conf. Web Search DataMining, 2015, pp. 379-388.
-
(2015)
Proc. 11th ACMInt. Conf. Web Search DataMining
, pp. 379-388
-
-
Balalau, O.D.1
Bonchi, F.2
Chan, T.3
Gullo, F.4
Sozio, M.5
-
14
-
-
0035788930
-
A spectral method to separate disconnected and nearly-disconnected web graph components
-
C. H. Ding, X. He, and H. Zha, "A spectral method to separate disconnected and nearly-disconnected web graph components, " in Proc. 7th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2001, pp. 275-280.
-
(2001)
Proc. 7th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining
, pp. 275-280
-
-
Ding, C.H.1
He, X.2
Zha, H.3
-
15
-
-
77956529455
-
A local algorithm for finding dense subgraphs
-
R. Andersen, "A local algorithm for finding dense subgraphs, " Trans. Algorithms, vol. 6, no. 4, p. 60, 2010.
-
(2010)
Trans. Algorithms
, vol.6
, Issue.4
, pp. 60
-
-
Andersen, R.1
-
16
-
-
80052670229
-
A survey of algorithms for dense subgraph discovery
-
V. E. Lee, N. Ruan, R. Jin, and C. Aggarwal, "A survey of algorithms for dense subgraph discovery, " in Proc. Int. Conf. Manag. Mining Graph Data, 2010, pp. 303-336.
-
(2010)
Proc. Int. Conf. Manag. Mining Graph Data
, pp. 303-336
-
-
Lee, V.E.1
Ruan, N.2
Jin, R.3
Aggarwal, C.4
-
17
-
-
0034144758
-
A multilinear singular value decomposition
-
L. De Lathauwer, B. De Moor, and J. Vandewalle, "A multilinear singular value decomposition, " SIAM J. Matrix Anal. Appl., vol. 21, no. 4, pp. 1253-1278, 2000.
-
(2000)
SIAM J. Matrix Anal. Appl.
, vol.21
, Issue.4
, pp. 1253-1278
-
-
De Lathauwer, L.1
De Moor, B.2
Vandewalle, J.3
-
18
-
-
77951291046
-
A singular value thresholding algorithm for matrix completion
-
J.-F. Cai, E. J. Candes, and Z. Shen, "A singular value thresholding algorithm for matrix completion, " SIAM J. Optimization, vol. 20, no. 4, pp. 1956-1982, 2010.
-
(2010)
SIAM J. Optimization
, vol.20
, Issue.4
, pp. 1956-1982
-
-
Cai, J.-F.1
Candes, E.J.2
Shen, Z.3
-
19
-
-
65149091304
-
Simultaneous tensor subspace selection and clustering: The equivalence of high order SVD and K-means clustering
-
H. Huang, C. Ding, D. Luo, and T. Li, "Simultaneous tensor subspace selection and clustering: The equivalence of high order SVD and K-means clustering, " in Proc. ACMSIGKDD, 2008, pp. 327-335.
-
(2008)
Proc. ACMSIGKDD
, pp. 327-335
-
-
Huang, H.1
Ding, C.2
Luo, D.3
Li, T.4
-
20
-
-
68649096448
-
Tensor decompositions and applications
-
T. G. Kolda and B. W. Bader, "Tensor decompositions and applications, " SIAM Rev., vol. 51, no. 3, pp. 455-500, 2009.
-
(2009)
SIAM Rev.
, vol.51
, Issue.3
, pp. 455-500
-
-
Kolda, T.G.1
Bader, B.W.2
-
21
-
-
84973318190
-
The pagerank citation ranking: Bringing order to the web
-
L. Page, S. Brin, R. Motwani, and T. Winograd, "The pagerank citation ranking: Bringing order to the web, " Stanford InfoLab, Tech. Rep. SIDL-WP-1999-0120, 1999.
-
(1999)
Stanford InfoLab, Tech. Rep. SIDL-WP
, pp. 0120-1999
-
-
Page, L.1
Brin, S.2
Motwani, R.3
Winograd, T.4
-
22
-
-
34548580783
-
Neighborhood formation and anomaly detection in bipartite graphs
-
J. Sun, H. Qu, D. Chakrabarti, and C. Faloutsos, "Neighborhood formation and anomaly detection in bipartite graphs, " in Proc. 5th IEEE Int. Conf. Data Mining, 2005, pp. 418-425.
-
(2005)
Proc. 5th IEEE Int. Conf. Data Mining
, pp. 418-425
-
-
Sun, J.1
Qu, H.2
Chakrabarti, D.3
Faloutsos, C.4
-
23
-
-
79956333190
-
Eigenspokes: Surprising patterns and scalable community chipping in large graphs
-
B. A. Prakash, A. Sridharan, M. Seshadri, S. Machiraju, and C. Faloutsos, "Eigenspokes: Surprising patterns and scalable community chipping in large graphs, " in Proc. 14th Pacific-Asia Conf. Adv. Knowl. Discovery Data Mining, 2010, pp. 435-448.
-
(2010)
Proc. 14th Pacific-Asia Conf. Adv. Knowl. Discovery Data Mining
, pp. 435-448
-
-
Prakash, B.A.1
Sridharan, A.2
Seshadri, M.3
Machiraju, S.4
Faloutsos, C.5
-
24
-
-
85131818719
-
Combating web spam with trustrank
-
Z. Gyogyi, H. Garcia-Molina, and J. Pedersen, "Combating web spam with trustrank, " in Proc. 13th Int. Conf. Very Large Data Bases, 2004, pp. 576-587.
-
(2004)
Proc. 13th Int. Conf. Very Large Data Bases
, pp. 576-587
-
-
Gyogyi, Z.1
Garcia-Molina, H.2
Pedersen, J.3
-
25
-
-
34250632435
-
Topical trustrank: Using topicality to combat web spam
-
B. N. Wu, V. Goel, and B. D. Davison, "Topical trustrank: Using topicality to combat web spam, " in Proc. 15th Int. Conf. World Wide Web, 2006, pp. 63-72.
-
(2006)
Proc. 15th Int. Conf. World Wide Web
, pp. 63-72
-
-
Wu, B.N.1
Goel, V.2
Davison, B.D.3
-
26
-
-
84860851065
-
Understanding and combating link farming in the twitter social network
-
S. Ghosh, B. Viswanath, and F. Kooti, "Understanding and combating link farming in the twitter social network, " in Proc. 21st Int. Conf. World Wide Web, 2012, pp. 61-70.
-
(2012)
Proc. 21st Int. Conf. World Wide Web
, pp. 61-70
-
-
Ghosh, S.1
Viswanath, B.2
Kooti, F.3
-
28
-
-
85015988583
-
Aiding the detection of fake accounts in large scale social online services
-
Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro, "Aiding the detection of fake accounts in large scale social online services, " in Proc. 9th USENIX Conf. Netw. Syst. Des. Implementation, 2012, pp. 15-15.
-
(2012)
Proc. 9th USENIX Conf. Netw. Syst. Des. Implementation
, pp. 15
-
-
Cao, Q.1
Sirivianos, M.2
Yang, X.3
Pregueiro, T.4
-
30
-
-
72449133353
-
Detecting spammers and content promoters in online video social networks
-
F. Benevenuto, T. Rodrigues, V. Almeida, J. Almeida, and M. Goncalves, "Detecting spammers and content promoters in online video social networks, " in Proc. 32nd Int. ACM SIGIR Conf. Res. Develop. Inform. Retrieval, 2009, pp. 620-627.
-
(2009)
Proc. 32nd Int. ACM SIGIR Conf. Res. Develop. Inform. Retrieval
, pp. 620-627
-
-
Benevenuto, F.1
Rodrigues, T.2
Almeida, V.3
Almeida, J.4
Goncalves, M.5
-
31
-
-
84896063139
-
Social spammer detection in microblogging
-
X. Hu, J. Tang, Y. Zhang, and H. Liu, "Social spammer detection in microblogging, " in Proc. 23rd Int. Joint Conf. Artif. Intell., 2013, pp. 2633-2639.
-
(2013)
Proc. 23rd Int. Joint Conf. Artif. Intell.
, pp. 2633-2639
-
-
Hu, X.1
Tang, J.2
Zhang, Y.3
Liu, H.4
-
32
-
-
84990909879
-
Detecting suspicious following behavior in multimillion-node social networks
-
M. Jiang, P. Cui, A. Beutel, C. Faloutsos, and S. Yang, "Detecting suspicious following behavior in multimillion-node social networks, " in Proc. 23rd Int. Conf. WorldWideWeb, 2014, pp. 305-306.
-
(2014)
Proc. 23rd Int. Conf. WorldWideWeb
, pp. 305-306
-
-
Jiang, M.1
Cui, P.2
Beutel, A.3
Faloutsos, C.4
Yang, S.5
-
33
-
-
55149108152
-
Incremental tensor analysis: Theory and applications
-
Art. no. 11
-
J. Sun, D. Tao, S. Papadimitriou, P. S. Yu, and C. Faloutsos, "Incremental tensor analysis: Theory and applications, " ACM Trans. Knowl. Discovery Data, vol. 2, no. 3, 2008, Art. no. 11.
-
(2008)
ACM Trans. Knowl. Discovery Data
, vol.2
, Issue.3
-
-
Sun, J.1
Tao, D.2
Papadimitriou, S.3
Yu, P.S.4
Faloutsos, C.5
-
34
-
-
67049173946
-
Scalable tensor decompositions for multiaspect data mining
-
T. G. Kolda and J. Sun, "Scalable tensor decompositions for multiaspect data mining, " in Proc. 8th IEEE Int. Conf. Data Mining, 2008, pp. 363-372.
-
(2008)
Proc. 8th IEEE Int. Conf. Data Mining
, pp. 363-372
-
-
Kolda, T.G.1
Sun, J.2
-
35
-
-
77956032667
-
Hierarchical singular value decomposition of tensors
-
L. Grasedyck, "Hierarchical singular value decomposition of tensors, " SIAM J. Matrix Anal. Appl., vol. 31, no. 4, pp. 2029-2054, 2010.
-
(2010)
SIAM J. Matrix Anal. Appl.
, vol.31
, Issue.4
, pp. 2029-2054
-
-
Grasedyck, L.1
-
36
-
-
0042657622
-
Greedily finding a dense subgraph
-
Y. Asahiro, K. Iwama, H. Tamaki, and T. Tokuyama, "Greedily finding a dense subgraph, " J. Algorithms, vol. 34, no. 2, pp. 203-221, 2000.
-
(2000)
J. Algorithms
, vol.34
, Issue.2
, pp. 203-221
-
-
Asahiro, Y.1
Iwama, K.2
Tamaki, H.3
Tokuyama, T.4
-
37
-
-
0037133227
-
Random graph models of social networks
-
M. EJ Newman, D. J. Watts, and S. H. Strogatz, "Random graph models of social networks, " in Proc. Nat. Acad. Sci., 2002, pp. 2566-2572.
-
(2002)
Proc. Nat. Acad. Sci.
, pp. 2566-2572
-
-
Newman, M.E.J.1
Watts, D.J.2
Strogatz, S.H.3
-
38
-
-
84940879259
-
Haten2: Billion-scale tensor decompositions
-
J. Inah, E. E. Papalexakis, U. Kang, and C. Faloutsos, "Haten2: Billion-scale tensor decompositions, " in Proc. IEEE 31st Int. Conf. Data Eng., 2015, pp. 1047-1058.
-
(2015)
Proc. IEEE 31st Int. Conf. Data Eng.
, pp. 1047-1058
-
-
Inah, J.1
Papalexakis, E.E.2
Kang, U.3
Faloutsos, C.4
-
39
-
-
84878700321
-
A first look at modern enterprise traffic
-
R. Pang, M. Allman, M. Bennett, J. Lee, V. Paxson, and B. Tierney, "A first look at modern enterprise traffic, " in Proc. 5th ACM SIGCOMM Conf. Internet Meas., 2005, pp. 2-2.
-
(2005)
Proc. 5th ACM SIGCOMM Conf. Internet Meas.
, pp. 2
-
-
Pang, R.1
Allman, M.2
Bennett, M.3
Lee, J.4
Paxson, V.5
Tierney, B.6
-
40
-
-
27144441097
-
An evaluation of statistical approaches to text categorization
-
Y. Yang, "An evaluation of statistical approaches to text categorization, " Inform. Retrieval, vol. 1, no. 1/2, pp. 69-90, 1999.
-
(1999)
Inform. Retrieval
, vol.1
, Issue.1-2
, pp. 69-90
-
-
Yang, Y.1
|