Dickerson, JP, Kagan, V, Subrahmanian, VS. Using sentiment to detect bots on twitter: are humans more opinionated than bots? In International Conference on Advances in Social Networks Analysis and Mining ASONAM, 2014, 620–627.
Beutel, A, Xu, W, Guruswami, V, Palow, C, Faloutsos, C. Copycatch: stopping group attacks by spotting lockstep behavior in social networks. In Proceedings of the 22nd International Conference on World Wide Web, WWW ’13, 2013, 119–130.
Kumar, S, Spezzano, F, Subrahmanian, VS. Vews: a Wikipedia vandal early warning system. In Proceedings of the 21st ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’15, 2015, 607–616.
Akoglu, L, Tong, H, Koutra, D. Graph based anomaly detection and description: a survey. Data Min Knowl Discov 2015, 29:626–688.
Ranshous, S, Shen, S, Koutra, D, Harenberg, S, Faloutsos, C, Samatova, NF. Anomaly detection in dynamic networks: a survey. Wiley Interdiscip Rev Comput Stat 2015, 7:223–247.
Yu, R, Qiu, H, Wen, Z, Lin, CY, Liu, Y. A survey on social media anomaly detection. SIGKDD Explor Newsl 2016, 18:1–14.
Jiang, M, Cui, P, Faloutsos, C. Suspicious behavior detection: current trends and future directions. Special Issue on Online Behavioral Analysis and Modeling, IEEE Intelligent Systems Magazine, 2016.
Cao, Q, Yang, X, Yu, J, Palow, C. Uncovering large groups of active malicious accounts in online social networks. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS ’14, 2014, 477–488.
Fakhraei, S, Foulds, J, Shashanka, M, Getoor, L. Collective spammer detection in evolving multi‐relational social networks. In Proceedings of the 21st ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’15, 2015, 1769–1778.
Costa, AF, Yamaguchi, Y, Traina, AJM, Traina, C Jr, Faloutsos, C. Rsc: mining and modeling temporal activity in social media. In Proceedings of the 21st ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’15, 2015, 269–278.
BHooi,, Song, HA, Beutel, A, Shah, N, Shin, K, Faloutsos, C. FRAUDAR: bounding graph fraud in the face of camouflage. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016, 895–904.
Rossi, RA, Gallagher, B, Neville, J, Henderson, K. Modeling dynamic behavior in large evolving graphs. In Proceedings of the Sixth ACM International Conference on Web Search and Data Mining, WSDM ’13, 2013, 667–676.
Wang, G, Konolige, T, Wilson, C, Wang, X, Zheng, H, Zhao, BY. You are how you: Clickstream analysis for Sybil detection. In Proceedings of the 22nd USENIX Conference on Security, SEC ’13, 2013, 241–256.
Jiang, M, Beutel, A, Cui, P, Hooi, B, Yang, S, Faloutsos, C. A general suspiciousness metric for dense blocks in multimodal data. In Proceedings of the 2015 I.E. International Conference on Data Mining (ICDM), ICDM ’15, 2015, 781–786.
Kumar, S, West, R, Leskovec, J. Disinformation on the web: impact, characteristics, and detection of Wikipedia hoaxes. In Proceedings of the 25th International Conference on World Wide Web, WWW ’16, 2016, 591–602.
Li, Y, Martinez, O, Chen, X, Li, Y, Hopcroft, JE. In a world that counts: clustering and detecting fake social engagement at scale. In Proceedings of the 25th International Conference on World Wide Web, WWW ’16, 2016, 111–120.
Zhang, Y, Xiong, Y, Kong, X, Zhu, Y. Netcycle: collective evolution inference in heterogeneous information networks. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016, 1365–1374.
Günnemann, N, Günnemann, S, Faloutsos, C. Robust multivariate autoregression for anomaly detection in dynamic product ratings. In Proceedings of the 23rd International Conference on World Wide Web, WWW ’14, 2014, 361–372.
Pincombe, B. Anomaly detection in time series of graphs using ARMA processes. In ASOR BULLETIN, 2005.
Heard, NA, Weston, DJ, Platanioti, K, Hand, DJ. Bayesian anomaly detection methods for social networks. Ann Appl Stat 2010, 4:645–662.
Yasami, Y, Safaei, F. A statistical infinite feature cascade‐based approach to anomaly detection for dynamic social networks. Comput Commun 2017, 100:52–64.
Hanneke, S, W, F, Xing, EP. Discrete temporal models of social networks. Electron J Stat 2010, 4:585–605.
Snijders, TAB, Van de Bunt, GG, Steglich, CEG. Introduction to stochastic actor‐based models for network dynamics. Soc Netw 2010, 32:44–60.
Whitle, P. Hypothesis Testing in Time Series Analysis, vol. 4. Stockholm: Almqvist & Wiksell; 1951.
Levenberg, K. A method for the solution of certain non‐linear problems in least squares. Q Appl Math 1944, 2:164–168.
Quinlan, JR. Simplifying decision trees. Int J Man–Mach Stud 1987, 27:221–234.
Russell, S, Norvig, P, Artificial Intelligence. A Modern Approach. Artificial Intelligence, vol. 25. Englewood Cliffs, NJ: Prentice‐Hall; 1995, 27.
Cortes, C, Vapnik, V. Support‐vector networks. Mach Learn 1995, 20:273–297.
Ho, TK. Random decision forests. In 1995, Proceedings of the Third International Conference on Document Analysis and Recognition, vol 1, 1995, 278–282.
Friedman, J, Hastie, T, Tibshirani, R. The elements of statistical learning. In: Springer Series in Statistics, vol. 1. Berlin: Springer; 2001.
Friedman, JH. Stochastic gradient boosting. Comput Stat Data Anal 2002, 38:367–378.
Karypis, G, Kumar, V. Multilevel k‐way partitioning scheme for irregular graphs. J Parallel Distrib Comput 1998, 48:96–129.
Giatsoglou, M, Chatzakou, D, Shah, N, Beutel, A, Faloutsos, C, AVakali,. Nd‐sync: detecting synchronized fraud activities. In The 19th Pacific Asia Conference on Knowledge Discovery and Data Mining PAKDD, 2015, 201–214.
Jiang, M, Cui, P, Beutel, A, Faloutsos, C, Yang, S. Inferring strange behavior from connectivity pattern in social networks. In The 18th Pacific Asia Conference on Knowledge Discovery and Data Mining PAKDD, 2014.
Stringhini, G, Mourlanne, P, Jacob, G, Egele, M, Kruegel, C, Vigna, G. Evilcohort: detecting communities of malicious accounts on online services. In Proceedings of the 24th USENIX Conference on Security Symposium, SEC ’15, 2015, 563–578.
Gleich, DF, Mahoney, MW. Using local spectral methods to robustify graph‐based learning algorithms. In Proceedings of the 21st ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’15, 2015, 359–368.