A comprehensive survey on graph anomaly detection with deep learning

X Ma, J Wu, S Xue, J Yang, C Zhou… - … on Knowledge and …, 2021 - ieeexplore.ieee.org
Anomalies are rare observations (eg, data records or events) that deviate significantly from
the others in the sample. Over the past few decades, research on anomaly mining has …

Graph clustering based on structural/attribute similarities

Y Zhou, H Cheng, JX Yu - Proceedings of the VLDB Endowment, 2009 - dl.acm.org
The goal of graph clustering is to partition vertices in a large graph into different clusters
based on various criteria such as vertex connectivity or neighborhood similarity. Graph …

Social network analysis and mining for business applications

F Bonchi, C Castillo, A Gionis, A Jaimes - ACM Transactions on …, 2011 - dl.acm.org
Social network analysis has gained significant attention in recent years, largely due to the
success of online social networking and media-sharing sites, and the consequent …

Mining graph evolution rules

M Berlingerio, F Bonchi, B Bringmann… - Machine Learning and …, 2009 - Springer
In this paper we introduce graph-evolution rules, a novel type of frequency-based pattern
that describe the evolution of large networks over time, at a local level. Given a sequence of …

Clustering large attributed graphs: A balance between structural and attribute similarities

H Cheng, Y Zhou, JX Yu - … on Knowledge Discovery from Data (TKDD), 2011 - dl.acm.org
Social networks, sensor networks, biological networks, and many other information networks
can be modeled as a large graph. Graph vertices represent entities, and graph edges …

Social sensing

CC Aggarwal, T Abdelzaher - Managing and mining sensor data, 2013 - Springer
A number of sensor applications in recent years collect data which can be directly
associated with human interactions. Some examples of such applications include GPS …

Com2: fast automatic discovery of temporal ('comet') communities

M Araujo, S Papadimitriou, S Günnemann… - Advances in Knowledge …, 2014 - Springer
Given a large network, changing over time, how can we find patterns and anomalies? We
propose Com2, a novel and fast, incremental tensor analysis approach, which can discover …

A survey on social media anomaly detection

R Yu, H Qiu, Z Wen, CY Lin, Y Liu - ACM SIGKDD Explorations …, 2016 - dl.acm.org
Social media anomaly detection is of critical importance to prevent malicious activities such
as bullying, terrorist attack planning, and fraud information dissemination. With the recent …

Detecting urban black holes based on human mobility data

L Hong, Y Zheng, D Yung, J Shang, L Zou - Proceedings of the 23rd …, 2015 - dl.acm.org
Many types of human mobility data, such as flows of taxicabs, card swiping data of subways,
bike trip data and Call Details Records (CDR), can be modeled by a Spatio-Temporal Graph …

Методы анализа компьютерных социальных сетей

ТВ Батура - Вестник Новосибирского государственного …, 2012 - cyberleninka.ru
Представлен обзор работ, посвященных проблеме анализа компьютерных
социальных сетей. Существует четыре основных направления исследований в данной …