A survey of link prediction in complex networks

V Martínez, F Berzal, JC Cubero - ACM computing surveys (CSUR), 2016 - dl.acm.org
Networks have become increasingly important to model complex systems composed of
interacting elements. Network data mining has a large number of applications in many …

Point-of-interest recommendations: Learning potential check-ins from friends

H Li, Y Ge, R Hong, H Zhu - Proceedings of the 22nd ACM SIGKDD …, 2016 - dl.acm.org
The emergence of Location-based Social Network (LBSN) services provides a wonderful
opportunity to build personalized Point-of-Interest (POI) recommender systems. Although a …

[HTML][HTML] Compact integration of multi-network topology for functional analysis of genes

H Cho, B Berger, J Peng - Cell systems, 2016 - cell.com
The topological landscape of molecular or functional interaction networks provides a rich
source of information for inferring functional patterns of genes or proteins. However, a …

You are who you know and how you behave: Attribute inference attacks via users' social friends and behaviors

NZ Gong, B Liu - 25th USENIX Security Symposium (USENIX Security …, 2016 - usenix.org
We propose new privacy attacks to infer attributes (eg, locations, occupations, and interests)
of online social network users. Our attacks leverage seemingly innocent user information …

Correspondence driven saliency transfer

W Wang, J Shen, L Shao… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we show that large annotated data sets have great potential to provide strong
priors for saliency estimation rather than merely serving for benchmark evaluations. To this …

A survey on social media anomaly detection

R Yu, H Qiu, Z Wen, CY Lin, Y Liu - ACM SIGKDD Explorations …, 2016 - dl.acm.org
Social media anomaly detection is of critical importance to prevent malicious activities such
as bullying, terrorist attack planning, and fraud information dissemination. With the recent …

Ranking causal anomalies via temporal and dynamical analysis on vanishing correlations

W Cheng, K Zhang, H Chen, G Jiang, Z Chen… - Proceedings of the …, 2016 - dl.acm.org
Modern world has witnessed a dramatic increase in our ability to collect, transmit and
distribute real-time monitoring and surveillance data from large-scale information systems …

Tribeflow: Mining & predicting user trajectories

F Figueiredo, B Ribeiro, JM Almeida… - Proceedings of the 25th …, 2016 - dl.acm.org
Which song will Smith listen to next? Which restaurant will Alice go to tomorrow? Which
product will John click next? These applications have in common the prediction of user …

Context-aware location recommendation by using a random walk-based approach

H Bagci, P Karagoz - Knowledge and Information Systems, 2016 - Springer
The location-based social networks (LBSN) enable users to check in their current location
and share it with other users. The accumulated check-in data can be employed for the …

Characterizing gene sets using discriminative random walks with restart on heterogeneous biological networks

C Blatti, S Sinha - Bioinformatics, 2016 - academic.oup.com
Motivation: Analysis of co-expressed gene sets typically involves testing for enrichment of
different annotations or 'properties' such as biological processes, pathways, transcription …