A survey on social media anomaly detection

R Yu, H Qiu, Z Wen, CY Lin, Y Liu - ACM SIGKDD Explorations …, 2016 - dl.acm.org
Social media anomaly detection is of critical importance to prevent malicious activities such
as bullying, terrorist attack planning, and fraud information dissemination. With the recent …

A comparative analysis of large-scale network visualization tools

MAM Faysal, S Arifuzzaman - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Network (Graph) is a powerful abstraction for representing underlying relations and
structures in large complex systems. Network visualization provides a convenient way to …

Current and future challenges in mining large networks: Report on the second sdm workshop on mining networks and graphs

LB Holder, R Caceres, DF Gleich, J Riedy… - ACM SIGKDD …, 2016 - dl.acm.org
We report on the Second Workshop on Mining Networks and Graphs held at the 2015 SIAM
International Conference on Data Mining. This half-day workshop consisted of a keynote …

Intelligent digital libraries and tailored services

JP Leidig, EA Fox - Journal of Intelligent Information Systems, 2014 - Springer
A next generation of intelligent information systems will emerge from recent digital library
(DL) research. One aspect of this is based on intelligent technologies and applications in the …

Scalable mining, analysis and visualisation of protein-protein interaction networks

S Arifuzzaman, B Pandey - International Journal of Big Data …, 2019 - inderscienceonline.com
Proteins are linear chain biomolecules that are the basis of functional networks in all
organisms. Protein-protein interaction (PPI) networks are networks of protein complexes …

A parallel algorithm for generating a random graph with a prescribed degree sequence

H Bhuiyan, M Khan, M Marathe - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Random graphs (or networks) have gained a significant increase of interest due to its
popularity in modeling and simulating many complex real-world systems. Degree sequence …

Anti-reverse-engineering tool of executable files on the windows platform

L Chenke, Y Feng, G Qiyuan… - … and Engineering (CSE …, 2017 - ieeexplore.ieee.org
In response to the problems of the Windows executable being reverse-analyzed easily, we
introduce the technology of INT3 breakpoint detection and characteristics detection in the tail …

CINET 2.0: A cyberinfrastructure for network science

S Abdelhamid, M Alam, R Alo… - 2014 IEEE 10th …, 2014 - ieeexplore.ieee.org
Analysis of structural properties and dynamics of networks is currently a central topic in
many disciplines including Social Sciences, Biology and Business. CINET, a cyber …

Design and implementation of new planar massive MIMO systems for 5G wireless networks extending OMNeT++ simulator

V Inzillo, AA Quintana, F De Rango… - 2018 IEEE/ACM 22nd …, 2018 - ieeexplore.ieee.org
The progress accomplished in the modern wireless network are leading to the development
of efficient antenna devices that are able to achieve high level requirements with regard to …

An algorithm for influence maximization and target set selection for the deterministic linear threshold model

A Swaminathan - 2014 - vtechworks.lib.vt.edu
The problem of influence maximization has been studied extensively with applications that
include viral marketing, recommendations, and feed ranking. The optimization problem, first …