Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective. Shah, N., Beutel, A., Gallagher, B., & Faloutsos, C. CoRR, 2014.
Paper bibtex @article{DBLP:journals/corr/ShahBGF14,
author = {Neil Shah and
Alex Beutel and
Brian Gallagher and
Christos Faloutsos},
title = {Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective},
journal = {CoRR},
volume = {abs/1410.3915},
year = {2014},
url = {http://arxiv.org/abs/1410.3915},
eprinttype = {arXiv},
eprint = {1410.3915},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/ShahBGF14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"S4diKqSnKkd7cy6aQ","bibbaseid":"shah-beutel-gallagher-faloutsos-spottingsuspiciouslinkbehaviorwithfboxanadversarialperspective-2014","author_short":["Shah, N.","Beutel, A.","Gallagher, B.","Faloutsos, C."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Neil"],"propositions":[],"lastnames":["Shah"],"suffixes":[]},{"firstnames":["Alex"],"propositions":[],"lastnames":["Beutel"],"suffixes":[]},{"firstnames":["Brian"],"propositions":[],"lastnames":["Gallagher"],"suffixes":[]},{"firstnames":["Christos"],"propositions":[],"lastnames":["Faloutsos"],"suffixes":[]}],"title":"Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective","journal":"CoRR","volume":"abs/1410.3915","year":"2014","url":"http://arxiv.org/abs/1410.3915","eprinttype":"arXiv","eprint":"1410.3915","timestamp":"Mon, 13 Aug 2018 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/corr/ShahBGF14.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/corr/ShahBGF14,\n author = {Neil Shah and\n Alex Beutel and\n Brian Gallagher and\n Christos Faloutsos},\n title = {Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective},\n journal = {CoRR},\n volume = {abs/1410.3915},\n year = {2014},\n url = {http://arxiv.org/abs/1410.3915},\n eprinttype = {arXiv},\n eprint = {1410.3915},\n timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/corr/ShahBGF14.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Shah, N.","Beutel, A.","Gallagher, B.","Faloutsos, C."],"key":"DBLP:journals/corr/ShahBGF14","id":"DBLP:journals/corr/ShahBGF14","bibbaseid":"shah-beutel-gallagher-faloutsos-spottingsuspiciouslinkbehaviorwithfboxanadversarialperspective-2014","role":"author","urls":{"Paper":"http://arxiv.org/abs/1410.3915"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://dblp.org/pid/f/CFaloutsos.bib","dataSources":["zM4wMHSu34vjmb6Cm"],"keywords":[],"search_terms":["spotting","suspicious","link","behavior","fbox","adversarial","perspective","shah","beutel","gallagher","faloutsos"],"title":"Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective","year":2014}