Clustering and community detection in directed networks: A survey

FD Malliaros, M Vazirgiannis - Physics reports, 2013 - Elsevier
Networks (or graphs) appear as dominant structures in diverse domains, including
sociology, biology, neuroscience and computer science. In most of the aforementioned …

Copycatch: stop** group attacks by spotting lockstep behavior in social networks

A Beutel, W Xu, V Guruswami, C Palow… - Proceedings of the 22nd …, 2013 - dl.acm.org
How can web services that depend on user generated content discern fraudulent input by
spammers from legitimate input? In this paper we focus on the social network Facebook and …

Fast community detection by score

J ** - 2015 - projecteuclid.org
Supplementary material for “Fast communication detetion by SCORE”. Owing to space
constraints, the technical proofs are relegated a supplementary document. The …

Spotlight: Detecting anomalies in streaming graphs

D Eswaran, C Faloutsos, S Guha… - Proceedings of the 24th …, 2018 - dl.acm.org
How do we spot interesting events from e-mail or transportation logs? How can we detect
port scan or denial of service attacks from IP-IP communication data? In general, given a …

Flowscope: Spotting money laundering based on graphs

X Li, S Liu, Z Li, X Han, C Shi, B Hooi, H Huang… - Proceedings of the AAAI …, 2020 - aaai.org
Given a graph of the money transfers between accounts of a bank, how can we detect
money laundering? Money laundering refers to criminals using the bank's services to move …

Antibenford subgraphs: Unsupervised anomaly detection in financial networks

T Chen, C Tsourakakis - Proceedings of the 28th ACM SIGKDD …, 2022 - dl.acm.org
Benford's law describes the distribution of the first digit of numbers appearing in a wide
variety of numerical data, including tax records, and election outcomes, and has been used …

[BOOK][B] Mining user generated content

MF Moens, J Li, TS Chua - 2014 - books.google.com
Originating from Facebook, LinkedIn, Twitter, Instagram, YouTube, and many other
networking sites, the social media shared by users and the associated metadata are …

A synergistic approach for graph anomaly detection with pattern mining and feature learning

T Zhao, T Jiang, N Shah, M Jiang - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Detecting anomalies on graph data has two types of methods. One is pattern mining that
discovers strange structures globally such as quasi-cliques, bipartite cores, or dense blocks …

Catchsync: catching synchronized behavior in large directed graphs

M Jiang, P Cui, A Beutel, C Faloutsos… - Proceedings of the 20th …, 2014 - dl.acm.org
Given a directed graph of millions of nodes, how can we automatically spot anomalous,
suspicious nodes, judging only from their connectivity patterns? Suspicious graph patterns …

Efficient algorithms for densest subgraph discovery on large directed graphs

C Ma, Y Fang, R Cheng, LVS Lakshmanan… - Proceedings of the …, 2020 - dl.acm.org
Given a directed graph G, the directed densest subgraph (DDS) problem refers to the finding
of a subgraph from G, whose density is the highest among all the subgraphs of G. The DDS …