Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Koutra, Danai
add a person with the name Koutra, Danai
 

Other publications of authors with the same name

Graph based anomaly detection and description: a survey., , and . Data Min. Knowl. Discov., 29 (3): 626-688 (2015)Discovery of "comet" communities in temporal and labeled graphs Com^2., , , , , , , and . Knowl. Inf. Syst., 46 (3): 657-677 (2016)Unifying Guilt-by-Association Approaches: Theorems and Fast Algorithms., , , , , and . ECML/PKDD (2), volume 6912 of Lecture Notes in Computer Science, page 245-260. Springer, (2011)NetSimile: A Scalable Approach to Size-Independent Network Similarity, , , and . CoRR, (2012)Driving with Data: Modeling and Forecasting Vehicle Fleet Maintenance in Detroit., , , , , , and . CoRR, (2017)Linearized and Single-Pass Belief Propagation., , , and . PVLDB, 8 (5): 581-592 (2015)SURREAL: SUbgraph Robust REpresentAtion Learning., , , and . CoRR, (2018)GeoFlux: Hands-Off Data Integration Leveraging Join Key Knowledge., , , and . SIGMOD Conference, page 1797-1800. ACM, (2018)Net-Ray: Visualizing and Mining Billion-Scale Graphs., , , and . PAKDD (1), volume 8443 of Lecture Notes in Computer Science, page 348-361. Springer, (2014)Detecting insider threats in a real corporate database of computer usage activity., , , , , , , , , and 24 other author(s). KDD, page 1393-1401. ACM, (2013)