False information on web and social media: A survey S Kumar, N Shah arXiv preprint arXiv:1804.08559, 2018 | 347 | 2018 |
FRAUDAR: Bounding Graph Fraud in the Face of Camouflage B Hooi, HA Song, A Beutel, N Shah, K Shin, C Faloutsos Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge …, 2016 | 253 | 2016 |
Compressing the incompressible with ISABELA: In-situ reduction of spatio-temporal data S Lakshminarasimhan, N Shah, S Ethier, S Klasky, R Latham, R Ross, ... European Conference on Parallel Processing, 366-379, 2011 | 215 | 2011 |
TimeCrunch: Interpretable Dynamic Graph Summarization N Shah, D Koutra, T Zou, B Gallagher, C Faloutsos Proceedings of the 21th ACM SIGKDD International Conference on Knowledge …, 2015 | 148 | 2015 |
Birdnest: Bayesian inference for ratings-fraud detection B Hooi, N Shah, A Beutel, S Günnemann, L Akoglu, M Kumar, D Makhija, ... Proceedings of the 2016 SIAM International Conference on Data Mining, 495-503, 2016 | 120 | 2016 |
DeltaCon: Principled Massive-Graph Similarity Function with Attribution D Koutra, N Shah, JT Vogelstein, B Gallagher, C Faloutsos ACM Transactions on Knowledge Discovery from Data (TKDD) 10 (3), 28, 2016 | 114 | 2016 |
Spotting suspicious link behavior with fbox: An adversarial perspective N Shah, A Beutel, B Gallagher, C Faloutsos 2014 IEEE International Conference on Data Mining, 959-964, 2014 | 112 | 2014 |
Data Augmentation for Graph Neural Networks T Zhao, Y Liu, L Neves, O Woodford, M Jiang, N Shah AAAI, 2021 | 103 | 2021 |
ISABELA for effective in situ compression of scientific data S Lakshminarasimhan, N Shah, S Ethier, SH Ku, CS Chang, S Klasky, ... Concurrency and Computation: Practice and Experience 25 (4), 524-540, 2013 | 86 | 2013 |
ISOBAR preconditioner for effective and high-throughput lossless data compression ER Schendel, Y Jin, N Shah, J Chen, CS Chang, SH Ku, S Ethier, ... 2012 IEEE 28th international conference on data engineering, 138-149, 2012 | 84 | 2012 |
Semi-supervised Content-based Detection of Misinformation via Tensor Embeddings GB Guacho, S Abdali, N Shah, EE Papalexakis 2018 IEEE/ACM International Conference on Advances in Social Networks …, 2018 | 80 | 2018 |
Edgecentric: Anomaly detection in edge-attributed networks N Shah, A Beutel, B Hooi, L Akoglu, S Gunnemann, D Makhija, M Kumar, ... 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW …, 2016 | 69 | 2016 |
Graph-based fraud detection in the face of camouflage B Hooi, K Shin, HA Song, A Beutel, N Shah, C Faloutsos ACM Transactions on Knowledge Discovery from Data (TKDD) 11 (4), 1-26, 2017 | 58 | 2017 |
Retweeting Activity on Twitter: Signs of Deception M Giatsoglou, D Chatzakou, N Shah, C Faloutsos, A Vakali Pacific-Asia Conference on Knowledge Discovery and Data Mining, 122-134, 2015 | 57 | 2015 |
A unified view on graph neural networks as graph signal denoising Y Ma, X Liu, T Zhao, Y Liu, J Tang, N Shah Proceedings of the 30th ACM International Conference on Information …, 2021 | 43 | 2021 |
ND-Sync: Detecting Synchronized Fraud Activities M Giatsoglou, D Chatzakou, N Shah, A Beutel, C Faloutsos, A Vakali Pacific-Asia Conference on Knowledge Discovery and Data Mining, 201-214, 2015 | 41 | 2015 |
Beyond Outlier Detection: LOOKOUT for Pictorial Explanation N Gupta, D Eswaran, N Shah, L Akoglu, C Faloutsos ECML-PKDD, 2018 | 37 | 2018 |
The Many Faces of Link Fraud N Shah, H Lamba, A Beutel, C Faloutsos 2017 IEEE International Conference on Data Mining (ICDM), 1069-1074, 2017 | 36 | 2017 |
FLOCK: Combating Astroturfing on Livestreaming Platforms N Shah Proceedings of the 26th International Conference on World Wide Web, 1083-1091, 2017 | 33 | 2017 |
ALACRITY: Analytics-driven lossless data compression for rapid in-situ indexing, storing, and querying J Jenkins, I Arkatkar, S Lakshminarasimhan, DA Boyuka II, ER Schendel, ... Transactions on Large-Scale Data-and Knowledge-Centered Systems X, 95-114, 2013 | 33 | 2013 |