Gen2Out - Detecting and Ranking Generalized Anomalies. | 0 | 0.34 | 2021 |
MultiImport: Inferring Node Importance in a Knowledge Graph from Multiple Input Signals | 2 | 0.35 | 2020 |
Autonomous Graph Mining Algorithm Search with Best Speed/Accuracy Trade-off | 0 | 0.34 | 2020 |
AutoKnow: Self-Driving Knowledge Collection for Products of Thousands of Types | 2 | 0.36 | 2020 |
TRIAGE: Temporal Twitter attribute graph patterns. | 0 | 0.34 | 2020 |
Estimating Node Importance in Knowledge Graphs Using Graph Neural Networks. | 8 | 0.49 | 2019 |
Beyond Outliers and on to Micro-clusters: Vision-Guided Anomaly Detection. | 0 | 0.34 | 2019 |
WebHound: a data-driven intrusion detection from real-world web access logs | 0 | 0.34 | 2019 |
Linknbed: Multi-Graph Representation Learning With Entity Linkage | 3 | 0.39 | 2018 |
SDREGION: Fast Spotting of Changing Communities in Biological Networks. | 1 | 0.35 | 2018 |
Fast, Accurate, and Flexible Algorithms for Dense Subtensor Mining. | 4 | 0.37 | 2018 |
ZooBP: Belief Propagation for Heterogeneous Networks. | 0 | 0.34 | 2017 |
H-Fuse: Efficient Fusion of Aggregated Historical Data. | 1 | 0.36 | 2017 |
PowerCast: Mining and Forecasting Power Grid Sequences. | 6 | 0.69 | 2017 |
Ecosystem on the Web: non-linear mining and forecasting of co-evolving online activities. | 0 | 0.34 | 2017 |
Nonlinear Dynamics of Information Diffusion in Social Networks. | 1 | 0.40 | 2017 |
On Skewed Multi-dimensional Distributions: the FusionRP Model, Algorithms, and Discoveries. | 0 | 0.34 | 2016 |
Mining billion-scale tensors: algorithms and discoveries. | 14 | 0.57 | 2016 |
M-Zoom: Fast Dense-Block Detection in Tensors with Quality Guarantees. | 22 | 0.65 | 2016 |
Matrices, Compression, Learning Curves: Formulation, and the GroupNteach Algorithms. | 1 | 0.35 | 2016 |
CoreScope: Graph Mining Using k-Core Analysis — Patterns, Anomalies and Algorithms | 4 | 0.45 | 2016 |
Suspicious Behavior Detection: Current Trends and Future Directions. | 27 | 0.86 | 2016 |
Monitoring Manhattan'S Traffic At 5 Intersections? | 0 | 0.34 | 2016 |
Linearized and Single-Pass Belief Propagation. | 0 | 0.34 | 2015 |
ND-Sync: Detecting Synchronized Fraud Activities | 14 | 0.62 | 2015 |
Translation Invariant Word Embeddings | 11 | 0.53 | 2015 |
MassExodus: modeling evolving networks in harsh environments | 3 | 0.37 | 2015 |
Education, Learning and Information Theory. | 0 | 0.34 | 2015 |
An analysis on information diffusion through BlogCast in a blogosphere | 8 | 0.47 | 2015 |
Automatic Taxonomy Extraction from Bipartite Graphs | 0 | 0.34 | 2015 |
Trust prediction using positive, implicit, and negative information | 1 | 0.35 | 2014 |
CoBaFi: collaborative bayesian filtering | 21 | 0.72 | 2014 |
Net-Ray: Visualizing and Mining Billion-Scale Graphs. | 11 | 0.54 | 2014 |
Detecting anomalies in dynamic rating data: a robust probabilistic model for rating evolution | 21 | 0.77 | 2014 |
Universal and Distinct Properties of Communication Dynamics: How to Generate Realistic Inter-event Times | 8 | 0.57 | 2014 |
Large graph mining: patterns, cascades, fraud detection, and algorithms | 1 | 0.35 | 2014 |
Beyond Blocks: Hyperbolic Community Detection. | 14 | 0.59 | 2014 |
FUNNEL: automatic mining of spatially coevolving epidemics | 34 | 1.26 | 2014 |
MidiFind: Similarity Search and Popularity Mining in Large MIDI Databases. | 0 | 0.34 | 2013 |
Competing Memes Propagation on Networks: A Network Science Perspective | 24 | 1.00 | 2013 |
Detecting insider threats in a real corporate database of computer usage activity | 32 | 1.23 | 2013 |
CopyCatch: stopping group attacks by spotting lockstep behavior in social networks | 101 | 2.42 | 2013 |
Spatio-temporal mining of software adoption & penetration | 13 | 0.70 | 2013 |
Mining Connection Pathways for Marked Nodes in Large Graphs. | 15 | 0.71 | 2013 |
Patterns amongst Competing Task Frequencies: Super-Linearities, and the Almond-DG Model. | 8 | 0.46 | 2013 |
Large Graph Analysis in the GMine System | 4 | 0.45 | 2013 |
Interactively and Visually Exploring Tours of Marked Nodes in Large Graphs | 0 | 0.34 | 2012 |
Competing memes propagation on networks: a case study of composite networks | 14 | 0.77 | 2012 |
MultiAspectForensics: mining large heterogeneous networks using tensor | 1 | 0.36 | 2012 |
Managing and mining large graphs: patterns and algorithms | 5 | 0.40 | 2012 |