Clustering and community detection in directed networks: A survey
Networks (or graphs) appear as dominant structures in diverse domains, including
sociology, biology, neuroscience and computer science. In most of the aforementioned …
sociology, biology, neuroscience and computer science. In most of the aforementioned …
Copycatch: stop** group attacks by spotting lockstep behavior in social networks
How can web services that depend on user generated content discern fraudulent input by
spammers from legitimate input? In this paper we focus on the social network Facebook and …
spammers from legitimate input? In this paper we focus on the social network Facebook and …
Fast community detection by score
J ** - 2015 - projecteuclid.org
Supplementary material for “Fast communication detetion by SCORE”. Owing to space
constraints, the technical proofs are relegated a supplementary document. The …
constraints, the technical proofs are relegated a supplementary document. The …
Spotlight: Detecting anomalies in streaming graphs
How do we spot interesting events from e-mail or transportation logs? How can we detect
port scan or denial of service attacks from IP-IP communication data? In general, given a …
port scan or denial of service attacks from IP-IP communication data? In general, given a …
Flowscope: Spotting money laundering based on graphs
Given a graph of the money transfers between accounts of a bank, how can we detect
money laundering? Money laundering refers to criminals using the bank's services to move …
money laundering? Money laundering refers to criminals using the bank's services to move …
Antibenford subgraphs: Unsupervised anomaly detection in financial networks
Benford's law describes the distribution of the first digit of numbers appearing in a wide
variety of numerical data, including tax records, and election outcomes, and has been used …
variety of numerical data, including tax records, and election outcomes, and has been used …
[BOOK][B] Mining user generated content
Originating from Facebook, LinkedIn, Twitter, Instagram, YouTube, and many other
networking sites, the social media shared by users and the associated metadata are …
networking sites, the social media shared by users and the associated metadata are …
A synergistic approach for graph anomaly detection with pattern mining and feature learning
Detecting anomalies on graph data has two types of methods. One is pattern mining that
discovers strange structures globally such as quasi-cliques, bipartite cores, or dense blocks …
discovers strange structures globally such as quasi-cliques, bipartite cores, or dense blocks …
Catchsync: catching synchronized behavior in large directed graphs
Given a directed graph of millions of nodes, how can we automatically spot anomalous,
suspicious nodes, judging only from their connectivity patterns? Suspicious graph patterns …
suspicious nodes, judging only from their connectivity patterns? Suspicious graph patterns …
Efficient algorithms for densest subgraph discovery on large directed graphs
Given a directed graph G, the directed densest subgraph (DDS) problem refers to the finding
of a subgraph from G, whose density is the highest among all the subgraphs of G. The DDS …
of a subgraph from G, whose density is the highest among all the subgraphs of G. The DDS …