Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective. Shah, N., Beutel, A., Gallagher, B., & Faloutsos, C. In Kumar, R., Toivonen, H., Pei, J., Huang, J. Z., & Wu, X., editors, 2014 IEEE International Conference on Data Mining, ICDM 2014, Shenzhen, China, December 14-17, 2014, pages 959–964, 2014. IEEE Computer Society.
Paper doi bibtex @inproceedings{DBLP:conf/icdm/ShahBGF14,
author = {Neil Shah and
Alex Beutel and
Brian Gallagher and
Christos Faloutsos},
editor = {Ravi Kumar and
Hannu Toivonen and
Jian Pei and
Joshua Zhexue Huang and
Xindong Wu},
title = {Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective},
booktitle = {2014 {IEEE} International Conference on Data Mining, {ICDM} 2014,
Shenzhen, China, December 14-17, 2014},
pages = {959--964},
publisher = {{IEEE} Computer Society},
year = {2014},
url = {https://doi.org/10.1109/ICDM.2014.36},
doi = {10.1109/ICDM.2014.36},
timestamp = {Fri, 28 Feb 2025 17:23:41 +0100},
biburl = {https://dblp.org/rec/conf/icdm/ShahBGF14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"gSqfPLnRZLEwBb5MK","bibbaseid":"shah-beutel-gallagher-faloutsos-spottingsuspiciouslinkbehaviorwithfboxanadversarialperspective-2014","author_short":["Shah, N.","Beutel, A.","Gallagher, B.","Faloutsos, C."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Neil"],"propositions":[],"lastnames":["Shah"],"suffixes":[]},{"firstnames":["Alex"],"propositions":[],"lastnames":["Beutel"],"suffixes":[]},{"firstnames":["Brian"],"propositions":[],"lastnames":["Gallagher"],"suffixes":[]},{"firstnames":["Christos"],"propositions":[],"lastnames":["Faloutsos"],"suffixes":[]}],"editor":[{"firstnames":["Ravi"],"propositions":[],"lastnames":["Kumar"],"suffixes":[]},{"firstnames":["Hannu"],"propositions":[],"lastnames":["Toivonen"],"suffixes":[]},{"firstnames":["Jian"],"propositions":[],"lastnames":["Pei"],"suffixes":[]},{"firstnames":["Joshua","Zhexue"],"propositions":[],"lastnames":["Huang"],"suffixes":[]},{"firstnames":["Xindong"],"propositions":[],"lastnames":["Wu"],"suffixes":[]}],"title":"Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective","booktitle":"2014 IEEE International Conference on Data Mining, ICDM 2014, Shenzhen, China, December 14-17, 2014","pages":"959–964","publisher":"IEEE Computer Society","year":"2014","url":"https://doi.org/10.1109/ICDM.2014.36","doi":"10.1109/ICDM.2014.36","timestamp":"Fri, 28 Feb 2025 17:23:41 +0100","biburl":"https://dblp.org/rec/conf/icdm/ShahBGF14.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/icdm/ShahBGF14,\n author = {Neil Shah and\n Alex Beutel and\n Brian Gallagher and\n Christos Faloutsos},\n editor = {Ravi Kumar and\n Hannu Toivonen and\n Jian Pei and\n Joshua Zhexue Huang and\n Xindong Wu},\n title = {Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective},\n booktitle = {2014 {IEEE} International Conference on Data Mining, {ICDM} 2014,\n Shenzhen, China, December 14-17, 2014},\n pages = {959--964},\n publisher = {{IEEE} Computer Society},\n year = {2014},\n url = {https://doi.org/10.1109/ICDM.2014.36},\n doi = {10.1109/ICDM.2014.36},\n timestamp = {Fri, 28 Feb 2025 17:23:41 +0100},\n biburl = {https://dblp.org/rec/conf/icdm/ShahBGF14.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Shah, N.","Beutel, A.","Gallagher, B.","Faloutsos, C."],"editor_short":["Kumar, R.","Toivonen, H.","Pei, J.","Huang, J. Z.","Wu, X."],"key":"DBLP:conf/icdm/ShahBGF14","id":"DBLP:conf/icdm/ShahBGF14","bibbaseid":"shah-beutel-gallagher-faloutsos-spottingsuspiciouslinkbehaviorwithfboxanadversarialperspective-2014","role":"author","urls":{"Paper":"https://doi.org/10.1109/ICDM.2014.36"},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/f/CFaloutsos.bib","dataSources":["zM4wMHSu34vjmb6Cm"],"keywords":[],"search_terms":["spotting","suspicious","link","behavior","fbox","adversarial","perspective","shah","beutel","gallagher","faloutsos"],"title":"Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective","year":2014}