A comprehensive survey on graph anomaly detection with deep learning
Anomalies are rare observations (eg, data records or events) that deviate significantly from
the others in the sample. Over the past few decades, research on anomaly mining has …
the others in the sample. Over the past few decades, research on anomaly mining has …
Graph clustering based on structural/attribute similarities
The goal of graph clustering is to partition vertices in a large graph into different clusters
based on various criteria such as vertex connectivity or neighborhood similarity. Graph …
based on various criteria such as vertex connectivity or neighborhood similarity. Graph …
Social network analysis and mining for business applications
Social network analysis has gained significant attention in recent years, largely due to the
success of online social networking and media-sharing sites, and the consequent …
success of online social networking and media-sharing sites, and the consequent …
Mining graph evolution rules
In this paper we introduce graph-evolution rules, a novel type of frequency-based pattern
that describe the evolution of large networks over time, at a local level. Given a sequence of …
that describe the evolution of large networks over time, at a local level. Given a sequence of …
Clustering large attributed graphs: A balance between structural and attribute similarities
Social networks, sensor networks, biological networks, and many other information networks
can be modeled as a large graph. Graph vertices represent entities, and graph edges …
can be modeled as a large graph. Graph vertices represent entities, and graph edges …
Social sensing
CC Aggarwal, T Abdelzaher - Managing and mining sensor data, 2013 - Springer
A number of sensor applications in recent years collect data which can be directly
associated with human interactions. Some examples of such applications include GPS …
associated with human interactions. Some examples of such applications include GPS …
Com2: fast automatic discovery of temporal ('comet') communities
Given a large network, changing over time, how can we find patterns and anomalies? We
propose Com2, a novel and fast, incremental tensor analysis approach, which can discover …
propose Com2, a novel and fast, incremental tensor analysis approach, which can discover …
A survey on social media anomaly detection
Social media anomaly detection is of critical importance to prevent malicious activities such
as bullying, terrorist attack planning, and fraud information dissemination. With the recent …
as bullying, terrorist attack planning, and fraud information dissemination. With the recent …
Detecting urban black holes based on human mobility data
Many types of human mobility data, such as flows of taxicabs, card swiping data of subways,
bike trip data and Call Details Records (CDR), can be modeled by a Spatio-Temporal Graph …
bike trip data and Call Details Records (CDR), can be modeled by a Spatio-Temporal Graph …
Методы анализа компьютерных социальных сетей
ТВ Батура - Вестник Новосибирского государственного …, 2012 - cyberleninka.ru
Представлен обзор работ, посвященных проблеме анализа компьютерных
социальных сетей. Существует четыре основных направления исследований в данной …
социальных сетей. Существует четыре основных направления исследований в данной …