Остановите войну!
for scientists:
default search action
Alex Beutel
- > Home > Persons > Alex Beutel
Publications
- 2017
- [j5]Bryan Hooi, Kijung Shin, Hyun Ah Song, Alex Beutel, Neil Shah, Christos Faloutsos:
Graph-Based Fraud Detection in the Face of Camouflage. ACM Trans. Knowl. Discov. Data 11(4): 44:1-44:26 (2017) - [c26]Neil Shah, Hemank Lamba, Alex Beutel, Christos Faloutsos:
The Many Faces of Link Fraud. ICDM 2017: 1069-1074 - [i8]Neil Shah, Hemank Lamba, Alex Beutel, Christos Faloutsos:
OEC: Open-Ended Classification for Future-Proof Link-Fraud Detection. CoRR abs/1704.01420 (2017) - 2016
- [j4]Meng Jiang, Peng Cui, Alex Beutel, Christos Faloutsos, Shiqiang Yang:
Inferring lockstep behavior from connectivity pattern in large graphs. Knowl. Inf. Syst. 48(2): 399-428 (2016) - [j3]Meng Jiang, Peng Cui, Alex Beutel, Christos Faloutsos, Shiqiang Yang:
Catching Synchronized Behaviors in Large Networks: A Graph Mining Approach. ACM Trans. Knowl. Discov. Data 10(4): 35:1-35:27 (2016) - [j2]Meng Jiang, Alex Beutel, Peng Cui, Bryan Hooi, Shiqiang Yang, Christos Faloutsos:
Spotting Suspicious Behaviors in Multimodal Data: A General Metric and Algorithms. IEEE Trans. Knowl. Data Eng. 28(8): 2187-2200 (2016) - [c22]Neil Shah, Alex Beutel, Bryan Hooi, Leman Akoglu, Stephan Günnemann, Disha Makhija, Mohit Kumar, Christos Faloutsos:
EdgeCentric: Anomaly Detection in Edge-Attributed Networks. ICDM Workshops 2016: 327-334 - [c21]Bryan Hooi, Hyun Ah Song, Alex Beutel, Neil Shah, Kijung Shin, Christos Faloutsos:
FRAUDAR: Bounding Graph Fraud in the Face of Camouflage. KDD 2016: 895-904 - [c20]Bryan Hooi, Neil Shah, Alex Beutel, Stephan Günnemann, Leman Akoglu, Mohit Kumar, Disha Makhija, Christos Faloutsos:
BIRDNEST: Bayesian Inference for Ratings-Fraud Detection. SDM 2016: 495-503 - 2015
- [c18]Alex Beutel, Leman Akoglu, Christos Faloutsos:
Fraud Detection through Graph-Based User Behavior Modeling. CCS 2015: 1696-1697 - [c17]Meng Jiang, Alex Beutel, Peng Cui, Bryan Hooi, Shiqiang Yang, Christos Faloutsos:
A General Suspiciousness Metric for Dense Blocks in Multimodal Data. ICDM 2015: 781-786 - [c16]Alex Beutel, Leman Akoglu, Christos Faloutsos:
Graph-Based User Behavior Modeling: From Prediction to Fraud Detection. KDD 2015: 2309-2310 - [c15]Maria Giatsoglou, Despoina Chatzakou, Neil Shah, Alex Beutel, Christos Faloutsos, Athena Vakali:
ND-Sync: Detecting Synchronized Fraud Activities. PAKDD (2) 2015: 201-214 - [i4]Neil Shah, Alex Beutel, Bryan Hooi, Leman Akoglu, Stephan Günnemann, Disha Makhija, Mohit Kumar, Christos Faloutsos:
EdgeCentric: Anomaly Detection in Edge-Attributed Networks. CoRR abs/1510.05544 (2015) - [i3]Bryan Hooi, Neil Shah, Alex Beutel, Stephan Günnemann, Leman Akoglu, Mohit Kumar, Disha Makhija, Christos Faloutsos:
BIRDNEST: Bayesian Inference for Ratings-Fraud Detection. CoRR abs/1511.06030 (2015) - 2014
- [c12]Neil Shah, Alex Beutel, Brian Gallagher, Christos Faloutsos:
Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective. ICDM 2014: 959-964 - [c11]Meng Jiang, Peng Cui, Alex Beutel, Christos Faloutsos, Shiqiang Yang:
CatchSync: catching synchronized behavior in large directed graphs. KDD 2014: 941-950 - [c10]Meng Jiang, Peng Cui, Alex Beutel, Christos Faloutsos, Shiqiang Yang:
Inferring Strange Behavior from Connectivity Pattern in Social Networks. PAKDD (1) 2014: 126-138 - [c9]Alex Beutel, Partha Pratim Talukdar, Abhimanu Kumar, Christos Faloutsos, Evangelos E. Papalexakis, Eric P. Xing:
FlexiFaCT: Scalable Flexible Factorization of Coupled Tensors on Hadoop. SDM 2014: 109-117 - [c8]Alex Beutel, Kenton Murray, Christos Faloutsos, Alexander J. Smola:
CoBaFi: collaborative bayesian filtering. WWW 2014: 97-108 - [c7]Meng Jiang, Peng Cui, Alex Beutel, Christos Faloutsos, Shiqiang Yang:
Detecting suspicious following behavior in multimillion-node social networks. WWW (Companion Volume) 2014: 305-306 - [i1]Neil Shah, Alex Beutel, Brian Gallagher, Christos Faloutsos:
Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective. CoRR abs/1410.3915 (2014) - 2013
- [c6]Alex Beutel, Wanhong Xu, Venkatesan Guruswami, Christopher Palow, Christos Faloutsos:
CopyCatch: stopping group attacks by spotting lockstep behavior in social networks. WWW 2013: 119-130 - 2012
- [c4]Alex Beutel, B. Aditya Prakash, Roni Rosenfeld, Christos Faloutsos:
Interacting viruses in networks: can both survive? KDD 2012: 426-434 - [c3]B. Aditya Prakash, Alex Beutel, Roni Rosenfeld, Christos Faloutsos:
Winner takes all: competing viruses or ideas on fair-play networks. WWW 2012: 1037-1046
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-14 03:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint