M Oh, G Iyengar - Proceedings of the 25th ACM SIGKDD International …, 2019 - dl.acm.org
One of the most interesting application scenarios in anomaly detection is when sequential data are targeted. For example, in a safety-critical environment, it is crucial to have an …
The detection of organised disinformation campaigns that spread fake news, by first camouflaging them as real ones is crucial in the battle against misinformation and …
Graph similarity learning is a significant and fundamental issue in the theory and analysis of graphs, which has been applied in a variety of fields, including object tracking …
X Li, Y Cao, Q Li, Y Shang, Y Li, Y Liu, G Xu - World Wide Web, 2021 - Springer
User identity linkage is a task of recognizing the identities of the same user across different social networks (SN). Previous works tackle this problem via estimating the pairwise …
B Rajita, Y Ranjan, CT Umesh, S Panda - Arabian Journal for Science and …, 2020 - Springer
Prediction of events is imperative in many areas of social network (SN) applications. These events influence the temporal evolutionary characteristic of social networks. A study of these …
Identification and analysis of latent and emergent behavioral patterns are core tasks in investigative domains such as homeland security, counterterrorism, and crime prevention …
AS Kurniawansyah - Jurnal Rekayasa Sistem Informasi dan …, 2023 - journal.ppmi.web.id
In the context of Explainable Artificial Intelligence, there are two important keywords: interpretability and" explainability". Interpretability is the extent to which humans can …
Tracking individuals or groups based on their hidden and/or emergent behaviors is an indispensable task in homeland security, mental health evaluation, and consumer analytics …
S Tomaszek, L Fritsche, A Schürr - J. Object Technol., 2020 - jot.fm
Network virtualization enables flexible placement, migration, and execution of virtual networks and machines on physical hardware. This results in an NP-hard optimization …