Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HCDF: A Hybrid Community Discovery Framework., , , and . SDM, page 754-765. SIAM, (2010)The Responsibility Challenge for Data., , , , , and . SIGMOD Conference, page 412-414. ACM, (2019)Understanding Offline Political Systems by Mining Online Political Data., , and . WSDM, page 687-688. ACM, (2016)PATHATTACK: Attacking Shortest Paths in Complex Networks., , , , , and . ECML/PKDD (2), volume 12976 of Lecture Notes in Computer Science, page 532-547. Springer, (2021)Fast best-effort pattern matching in large attributed graphs., , , and . KDD, page 737-746. ACM, (2007)HYPA: Efficient Detection of Path Anomalies in Time Series Data on Networks., , , , , and . SDM, page 460-468. SIAM, (2020)The conference was canceled because of the coronavirus pandemic, the reviewed papers are published in this volume..When Collaborative Filtering is not Collaborative: Unfairness of PCA for Recommendations., , and . CoRR, (2023)Success in books: predicting book sales before publication., , , , and . EPJ Data Sci., 8 (1): 31:1-31:20 (2019)It's who you know: graph mining using recursive structural features., , , , , , and . KDD, page 663-671. ACM, (2011)RolX: structural role extraction & mining in large graphs., , , , , , , , and . KDD, page 1231-1239. ACM, (2012)