Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Correcting evaluation bias of relational classifiers with network cross validation., , , and . Knowl. Inf. Syst., 30 (1): 31-55 (2012)Detecting Novel Discrepancies in Communication Networks., , and . ICDM, page 8-17. IEEE Computer Society, (2010)Understanding Offline Political Systems by Mining Online Political Data., , and . WSDM, page 687-688. ACM, (2016)It's who you know: graph mining using recursive structural features., , , , , , and . KDD, page 663-671. ACM, (2011)Mining data from mobile devices: a survey of smart sensing and analytics., and . KDD, page 1524. ACM, (2013)RolX: structural role extraction & mining in large graphs., , , , , , , , and . KDD, page 1231-1239. ACM, (2012)AFRAID: Fraud Detection via Active Inference in Time-evolving Social Networks., , , , and . ASONAM, page 659-666. ACM, (2015)HCDF: A Hybrid Community Discovery Framework., , , and . SDM, page 754-765. SIAM, (2010)Multilevel Network Alignment., , , and . WWW, page 2344-2354. ACM, (2019)Fast best-effort pattern matching in large attributed graphs., , , and . KDD, page 737-746. ACM, (2007)