Author of the publication

Leveraging Multi-level Dependency of Relational Sequences for Social Spammer Detection.

, , , , and . CoRR, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Genuine Communities from Large-Scale Social Networks: A Pattern-Based Method., , , , and . Comput. J., 57 (9): 1343-1357 (2014)QoS Deviation Distance Based Negotiation Algorithm in Grid Resource Advance Reservation., , , and . CSCWD, page 605-610. IEEE, (2007)Efficient batch similarity join processing of social images based on arbitrary features., , , , and . World Wide Web, 19 (4): 725-753 (2016)HirePool: Optimizing Resource Reuse Based on a Hybrid Resource Pool in the Cloud., , , , and . IEEE Access, (2018)Parallelizing K-Means-Based Clustering on Spark., , , , and . CBD, page 31-36. IEEE, (2016)Popular Items or Niche Items: Flexible Recommendation Using Cosine Patterns., , , , and . ICDM Workshops, page 205-212. IEEE Computer Society, (2014)Identifying Spam in Reviews., , , and . Encyclopedia of Social Network Analysis and Mining. 2nd Ed., Springer, (2018)A Replica Replacement Algorithm Based on Value-Cost Prediction., , and . CSCWD (Selected Papers), volume 5236 of Lecture Notes in Computer Science, page 365-373. Springer, (2007)SEA: a system for event analysis on chinese tweets., , , , , and . KDD, page 1498-1501. ACM, (2013)Towards a Tricksy Group Shilling Attack Model against Recommender Systems., , , and . ADMA, volume 7713 of Lecture Notes in Computer Science, page 675-688. Springer, (2012)