Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective. Shah, N., Beutel, A., Gallagher, B., & Faloutsos, C. In Kumar, R., Toivonen, H., Pei, J., Huang, J. Z., & Wu, X., editors, 2014 IEEE International Conference on Data Mining, ICDM 2014, Shenzhen, China, December 14-17, 2014, pages 959–964, 2014. IEEE Computer Society.
Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective [link]Paper  doi  bibtex   
@inproceedings{DBLP:conf/icdm/ShahBGF14,
  author       = {Neil Shah and
                  Alex Beutel and
                  Brian Gallagher and
                  Christos Faloutsos},
  editor       = {Ravi Kumar and
                  Hannu Toivonen and
                  Jian Pei and
                  Joshua Zhexue Huang and
                  Xindong Wu},
  title        = {Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective},
  booktitle    = {2014 {IEEE} International Conference on Data Mining, {ICDM} 2014,
                  Shenzhen, China, December 14-17, 2014},
  pages        = {959--964},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICDM.2014.36},
  doi          = {10.1109/ICDM.2014.36},
  timestamp    = {Fri, 28 Feb 2025 17:23:41 +0100},
  biburl       = {https://dblp.org/rec/conf/icdm/ShahBGF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}

Downloads: 0