Detecting anomalies and events in data is a vital task, with numerous applications in security, finance, health care, law enforcement, and many others. While many techniques have been developed in past years for spotting outliers and anoma-lies in unstructured collections of multi-dimensional points, with graph data becoming ubiquitous, techniques for struc-tured graph data have been of focus recently. As objects in graphs have long-range correlations, novel technology has been developed for abnormality detection in graph data. The goal of this tutorial is to provide a general, compre-hensive overview of the state-of-the-art methods for anomaly, event, and fraud detection in data represented as graphs. As a key contribution, we provide a th...
The ability to mine data represented as a graph has become important in several domains for detectin...
This paper is motivated by the task of detecting anomalies in networks of financial transactions, wi...
This paper is motivated by the task of detecting anomalies in networks of financial transactions, wi...
Abstract Detecting anomalies in data is a vital task, with numerous high-impact ap-plications in are...
Detecting anomalies in data is a vital task, with numerous high-impact applications in areas such as...
Anomaly detection is an area that has received much attention in recent years. It has a wide variety...
National audienceIt is difficult to detect new types of attacks in heterogeneous and scalable networ...
National audienceIt is difficult to detect new types of attacks in heterogeneous and scalable networ...
National audienceIt is difficult to detect new types of attacks in heterogeneous and scalable networ...
In general, anomaly detection is the problem of distinguishing between normal data samples with well...
How can we detect fraudsters in large online review networks, or power grid failures using electrica...
International audienceIn the context of public procurement, several indicators called red flags are ...
International audienceIn the context of public procurement, several indicators called red flags are ...
International audienceIn the context of public procurement, several indicators called red flags are ...
The ability to mine data represented as a graph has become important in several domains for detectin...
The ability to mine data represented as a graph has become important in several domains for detectin...
This paper is motivated by the task of detecting anomalies in networks of financial transactions, wi...
This paper is motivated by the task of detecting anomalies in networks of financial transactions, wi...
Abstract Detecting anomalies in data is a vital task, with numerous high-impact ap-plications in are...
Detecting anomalies in data is a vital task, with numerous high-impact applications in areas such as...
Anomaly detection is an area that has received much attention in recent years. It has a wide variety...
National audienceIt is difficult to detect new types of attacks in heterogeneous and scalable networ...
National audienceIt is difficult to detect new types of attacks in heterogeneous and scalable networ...
National audienceIt is difficult to detect new types of attacks in heterogeneous and scalable networ...
In general, anomaly detection is the problem of distinguishing between normal data samples with well...
How can we detect fraudsters in large online review networks, or power grid failures using electrica...
International audienceIn the context of public procurement, several indicators called red flags are ...
International audienceIn the context of public procurement, several indicators called red flags are ...
International audienceIn the context of public procurement, several indicators called red flags are ...
The ability to mine data represented as a graph has become important in several domains for detectin...
The ability to mine data represented as a graph has become important in several domains for detectin...
This paper is motivated by the task of detecting anomalies in networks of financial transactions, wi...
This paper is motivated by the task of detecting anomalies in networks of financial transactions, wi...