False information on web and social media: A survey S Kumar, N Shah arXiv preprint arXiv:1804.08559, 2018 | 184 | 2018 |
Compressing the incompressible with ISABELA: In-situ reduction of spatio-temporal data S Lakshminarasimhan, N Shah, S Ethier, S Klasky, R Latham, R Ross, ... European Conference on Parallel Processing, 366-379, 2011 | 173 | 2011 |
FRAUDAR: Bounding Graph Fraud in the Face of Camouflage B Hooi, HA Song, A Beutel, N Shah, K Shin, C Faloutsos Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge …, 2016 | 157 | 2016 |
TimeCrunch: Interpretable Dynamic Graph Summarization N Shah, D Koutra, T Zou, B Gallagher, C Faloutsos Proceedings of the 21th ACM SIGKDD International Conference on Knowledge …, 2015 | 104 | 2015 |
Birdnest: Bayesian inference for ratings-fraud detection B Hooi, N Shah, A Beutel, S Günnemann, L Akoglu, M Kumar, D Makhija, ... Proceedings of the 2016 SIAM International Conference on Data Mining, 495-503, 2016 | 88 | 2016 |
DeltaCon: Principled Massive-Graph Similarity Function with Attribution D Koutra, N Shah, JT Vogelstein, B Gallagher, C Faloutsos ACM Transactions on Knowledge Discovery from Data (TKDD) 10 (3), 28, 2016 | 85 | 2016 |
Spotting suspicious link behavior with fbox: An adversarial perspective N Shah, A Beutel, B Gallagher, C Faloutsos 2014 IEEE International Conference on Data Mining, 959-964, 2014 | 83 | 2014 |
ISOBAR preconditioner for effective and high-throughput lossless data compression ER Schendel, Y Jin, N Shah, J Chen, CS Chang, SH Ku, S Ethier, ... 2012 IEEE 28th international conference on data engineering, 138-149, 2012 | 70 | 2012 |
ISABELA for effective in situ compression of scientific data S Lakshminarasimhan, N Shah, S Ethier, SH Ku, CS Chang, S Klasky, ... Concurrency and Computation: Practice and Experience 25 (4), 524-540, 2013 | 69 | 2013 |
Semi-supervised Content-based Detection of Misinformation via Tensor Embeddings GB Guacho, S Abdali, N Shah, EE Papalexakis 2018 IEEE/ACM International Conference on Advances in Social Networks …, 2018 | 42 | 2018 |
Edgecentric: Anomaly detection in edge-attributed networks N Shah, A Beutel, B Hooi, L Akoglu, S Gunnemann, D Makhija, M Kumar, ... 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW …, 2016 | 39 | 2016 |
Graph-based fraud detection in the face of camouflage B Hooi, K Shin, HA Song, A Beutel, N Shah, C Faloutsos ACM Transactions on Knowledge Discovery from Data (TKDD) 11 (4), 1-26, 2017 | 37 | 2017 |
Retweeting Activity on Twitter: Signs of Deception M Giatsoglou, D Chatzakou, N Shah, C Faloutsos, A Vakali Pacific-Asia Conference on Knowledge Discovery and Data Mining, 122-134, 2015 | 37 | 2015 |
ND-Sync: Detecting Synchronized Fraud Activities M Giatsoglou, D Chatzakou, N Shah, A Beutel, C Faloutsos, A Vakali Pacific-Asia Conference on Knowledge Discovery and Data Mining, 201-214, 2015 | 33 | 2015 |
ALACRITY: Analytics-driven lossless data compression for rapid in-situ indexing, storing, and querying J Jenkins, I Arkatkar, S Lakshminarasimhan, DA Boyuka II, ER Schendel, ... Transactions on Large-Scale Data-and Knowledge-Centered Systems X, 95-114, 2013 | 26 | 2013 |
FLOCK: Combating Astroturfing on Livestreaming Platforms N Shah Proceedings of the 26th International Conference on World Wide Web, 1083-1091, 2017 | 22 | 2017 |
The Many Faces of Link Fraud N Shah, H Lamba, A Beutel, C Faloutsos 2017 IEEE International Conference on Data Mining (ICDM), 1069-1074, 2017 | 20 | 2017 |
Analytics-driven lossless data compression for rapid in-situ indexing, storing, and querying J Jenkins, I Arkatkar, S Lakshminarasimhan, N Shah, ER Schendel, ... International Conference on Database and Expert Systems Applications, 16-30, 2012 | 14 | 2012 |
Beyond Outlier Detection: LOOKOUT for Pictorial Explanation N Gupta, D Eswaran, N Shah, L Akoglu, C Faloutsos ECML-PKDD, 2018 | 13 | 2018 |
An Empirical Comparison of the Summarization Power of Graph Clustering Methods Y Liu, N Shah, D Koutra NIPS Workshop on Networks in the Social and Information Sciences, 2015 | 11 | 2015 |