Name
Affiliation
Papers
CHRISTOS FALOUTSOS
Carnegie Mellon University, USA
598
Collaborators
Citations 
PageRank 
771
27972
4490.38
Referers 
Referees 
References 
34161
7602
9855
Search Limit
1001000
Title
Citations
PageRank
Year
Gen2Out - Detecting and Ranking Generalized Anomalies.00.342021
MultiImport: Inferring Node Importance in a Knowledge Graph from Multiple Input Signals20.352020
Autonomous Graph Mining Algorithm Search with Best Speed/Accuracy Trade-off00.342020
AutoKnow: Self-Driving Knowledge Collection for Products of Thousands of Types20.362020
TRIAGE: Temporal Twitter attribute graph patterns.00.342020
Estimating Node Importance in Knowledge Graphs Using Graph Neural Networks.80.492019
Beyond Outliers and on to Micro-clusters: Vision-Guided Anomaly Detection.00.342019
WebHound: a data-driven intrusion detection from real-world web access logs00.342019
Linknbed: Multi-Graph Representation Learning With Entity Linkage30.392018
SDREGION: Fast Spotting of Changing Communities in Biological Networks.10.352018
Fast, Accurate, and Flexible Algorithms for Dense Subtensor Mining.40.372018
ZooBP: Belief Propagation for Heterogeneous Networks.00.342017
H-Fuse: Efficient Fusion of Aggregated Historical Data.10.362017
PowerCast: Mining and Forecasting Power Grid Sequences.60.692017
Ecosystem on the Web: non-linear mining and forecasting of co-evolving online activities.00.342017
Nonlinear Dynamics of Information Diffusion in Social Networks.10.402017
On Skewed Multi-dimensional Distributions: the FusionRP Model, Algorithms, and Discoveries.00.342016
Mining billion-scale tensors: algorithms and discoveries.140.572016
M-Zoom: Fast Dense-Block Detection in Tensors with Quality Guarantees.220.652016
Matrices, Compression, Learning Curves: Formulation, and the GroupNteach Algorithms.10.352016
CoreScope: Graph Mining Using k-Core Analysis — Patterns, Anomalies and Algorithms40.452016
Suspicious Behavior Detection: Current Trends and Future Directions.270.862016
Monitoring Manhattan'S Traffic At 5 Intersections?00.342016
Linearized and Single-Pass Belief Propagation.00.342015
ND-Sync: Detecting Synchronized Fraud Activities140.622015
Translation Invariant Word Embeddings110.532015
MassExodus: modeling evolving networks in harsh environments30.372015
Education, Learning and Information Theory.00.342015
An analysis on information diffusion through BlogCast in a blogosphere80.472015
Automatic Taxonomy Extraction from Bipartite Graphs00.342015
Trust prediction using positive, implicit, and negative information10.352014
CoBaFi: collaborative bayesian filtering210.722014
Net-Ray: Visualizing and Mining Billion-Scale Graphs.110.542014
Detecting anomalies in dynamic rating data: a robust probabilistic model for rating evolution210.772014
Universal and Distinct Properties of Communication Dynamics: How to Generate Realistic Inter-event Times80.572014
Large graph mining: patterns, cascades, fraud detection, and algorithms10.352014
Beyond Blocks: Hyperbolic Community Detection.140.592014
FUNNEL: automatic mining of spatially coevolving epidemics341.262014
MidiFind: Similarity Search and Popularity Mining in Large MIDI Databases.00.342013
Competing Memes Propagation on Networks: A Network Science Perspective241.002013
Detecting insider threats in a real corporate database of computer usage activity321.232013
CopyCatch: stopping group attacks by spotting lockstep behavior in social networks1012.422013
Spatio-temporal mining of software adoption & penetration130.702013
Mining Connection Pathways for Marked Nodes in Large Graphs.150.712013
Patterns amongst Competing Task Frequencies: Super-Linearities, and the Almond-DG Model.80.462013
Large Graph Analysis in the GMine System40.452013
Interactively and Visually Exploring Tours of Marked Nodes in Large Graphs00.342012
Competing memes propagation on networks: a case study of composite networks140.772012
MultiAspectForensics: mining large heterogeneous networks using tensor10.362012
Managing and mining large graphs: patterns and algorithms50.402012
  • 1
  • 2