Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Minimum Wiener Connector., , , , and . CoRR, (2015)A Classification-Based Methodology for Planning Audit Strategies in Fraud Detection., , , and . KDD, page 175-184. ACM, (1999)Pushing Constraints to Detect Local Patterns, and . Local Pattern Detection, volume Volume 3539/2005 of Lecture Notes in Computer Science, page 1--19. (2005)Characterizing Uncertain Data using Compression., , and . SDM, page 534-545. SIAM / Omnipress, (2011)The role of information diffusion in the evolution of social networks, , , , , , , , and . Proc. 19th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), (2013)Interestingness is Not a Dichotomy: Introducing Softness in Constrained Pattern Mining., and . PKDD, volume 3721 of Lecture Notes in Computer Science, page 22-33. Springer, (2005)Counterfactual Graphs for Explainable Classification of Brain Networks., and . KDD, page 2495-2504. ACM, (2021)Counterfactual Explanations for Graph Classification Through the Lenses of Density., , and . xAI (1), volume 1901 of Communications in Computer and Information Science, page 324-348. Springer, (2023)Finding events in temporal networks: segmentation meets densest subgraph discovery., , , , and . Knowl. Inf. Syst., 62 (4): 1611-1639 (2020)Discovering Polarization Niches via Dense Subgraphs with Attractors and Repulsers., , , , and . Proc. VLDB Endow., 15 (13): 3883-3896 (2022)