Data-driven cybersecurity incident prediction: A survey

N Sun, J Zhang, P Rimba, S Gao… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
Driven by the increasing scale and high profile cybersecurity incidents related public data,
recent years we have witnessed a paradigm shift in understanding and defending against …

Graph summarization methods and applications: A survey

Y Liu, T Safavi, A Dighe, D Koutra - ACM computing surveys (CSUR), 2018 - dl.acm.org
While advances in computing resources have made processing enormous amounts of data
possible, human ability to identify patterns in such data has not scaled accordingly. Efficient …

Combining label propagation and simple models out-performs graph neural networks

Q Huang, H He, A Singh, SN Lim… - arXiv preprint arXiv …, 2020 - arxiv.org
Graph Neural Networks (GNNs) are the predominant technique for learning over graphs.
However, there is relatively little understanding of why GNNs are successful in practice and …

Multi-scale attributed node embedding

B Rozemberczki, C Allen… - Journal of Complex …, 2021 - academic.oup.com
We present network embedding algorithms that capture information about a node from the
local distribution over node attributes around it, as observed over random walks following an …

node2vec: Scalable feature learning for networks

A Grover, J Leskovec - Proceedings of the 22nd ACM SIGKDD …, 2016 - dl.acm.org
Prediction tasks over nodes and edges in networks require careful effort in engineering
features used by learning algorithms. Recent research in the broader field of representation …

Learning structural node embeddings via diffusion wavelets

C Donnat, M Zitnik, D Hallac, J Leskovec - Proceedings of the 24th ACM …, 2018 - dl.acm.org
Nodes residing in different parts of a graph can have similar structural roles within their local
network topology. The identification of such roles provides key insight into the organization …

Deepwalk: Online learning of social representations

B Perozzi, R Al-Rfou, S Skiena - Proceedings of the 20th ACM SIGKDD …, 2014 - dl.acm.org
We present DeepWalk, a novel approach for learning latent representations of vertices in a
network. These latent representations encode social relations in a continuous vector space …

Graph based anomaly detection and description: a survey

L Akoglu, H Tong, D Koutra - Data mining and knowledge discovery, 2015 - Springer
Detecting anomalies in data is a vital task, with numerous high-impact applications in areas
such as security, finance, health care, and law enforcement. While numerous techniques …

Verse: Versatile graph embeddings from similarity measures

A Tsitsulin, D Mottin, P Karras, E Müller - … of the 2018 world wide web …, 2018 - dl.acm.org
Embedding a web-scale information network into a low-dimensional vector space facilitates
tasks such as link prediction, classification, and visualization. Past research has addressed …

APATE: A novel approach for automated credit card transaction fraud detection using network-based extensions

V Van Vlasselaer, C Bravo, O Caelen… - Decision support …, 2015 - Elsevier
In the last decade, the ease of online payment has opened up many new opportunities for e-
commerce, lowering the geographical boundaries for retail. While e-commerce is still …