Data-driven cybersecurity incident prediction: A survey
Driven by the increasing scale and high profile cybersecurity incidents related public data,
recent years we have witnessed a paradigm shift in understanding and defending against …
recent years we have witnessed a paradigm shift in understanding and defending against …
node2vec: Scalable feature learning for networks
Prediction tasks over nodes and edges in networks require careful effort in engineering
features used by learning algorithms. Recent research in the broader field of representation …
features used by learning algorithms. Recent research in the broader field of representation …
Deepwalk: Online learning of social representations
We present DeepWalk, a novel approach for learning latent representations of vertices in a
network. These latent representations encode social relations in a continuous vector space …
network. These latent representations encode social relations in a continuous vector space …
Multi-scale attributed node embedding
We present network embedding algorithms that capture information about a node from the
local distribution over node attributes around it, as observed over random walks following an …
local distribution over node attributes around it, as observed over random walks following an …
Graph based anomaly detection and description: a survey
Detecting anomalies in data is a vital task, with numerous high-impact applications in areas
such as security, finance, health care, and law enforcement. While numerous techniques …
such as security, finance, health care, and law enforcement. While numerous techniques …
APATE: A novel approach for automated credit card transaction fraud detection using network-based extensions
In the last decade, the ease of online payment has opened up many new opportunities for e-
commerce, lowering the geographical boundaries for retail. While e-commerce is still …
commerce, lowering the geographical boundaries for retail. While e-commerce is still …
Rolx: structural role extraction & mining in large graphs
Given a network, intuitively two nodes belong to the same role if they have similar structural
behavior. Roles should be automatically determined from the data, and could be, for …
behavior. Roles should be automatically determined from the data, and could be, for …
Mining social networks for anomalies: Methods and challenges
Online social networks have received a dramatic increase of interest in the last decade due
to the growth of Internet and Web 2.0. They are among the most popular sites on the Internet …
to the growth of Internet and Web 2.0. They are among the most popular sites on the Internet …
Reformulating graph kernels for self-supervised space-time correspondence learning
Self-supervised space-time correspondence learning utilizing unlabeled videos holds great
potential in computer vision. Most existing methods rely on contrastive learning with mining …
potential in computer vision. Most existing methods rely on contrastive learning with mining …
Interactive anomaly detection on attributed networks
Performing anomaly detection on attributed networks concerns with finding nodes whose
patterns or behaviors deviate significantly from the majority of reference nodes. Its success …
patterns or behaviors deviate significantly from the majority of reference nodes. Its success …