Learning the network structure of a large graph is computationally demanding, and dynamically monitoring the network over time for any changes in structure threatens to be more challenging still. This paper presents a two-stage method for anomaly detection in dynamic graphs: the first stage uses simple, conjugate Bayesian models for discrete time counting processes to track the pairwise links of all nodes in the graph to assess normality of behavior; the second stage applies standard network inference tools on a greatly reduced subset of potentially anomalous nodes. The utility of the method is demonstrated on simulated and real data sets
Abstract—When working with large-scale network data, the interconnected entities often have addition...
As social networks take an ever-prominent role in information access, combating disinformation becom...
As social networks take an ever-prominent role in information access, combating disinformation becom...
Anomaly detection in dynamic communication networks has many important security applications. These ...
Dynamic networks, also called network streams, are an im-portant data representation that applies to...
In this work, we propose a new, fast and scalable method for anomaly detection in large time-evolvin...
Due to the proliferation of social networks and their significant effects on our day-to-day activiti...
We consider a continuous-time model for the evolution of social networks. A social network is here c...
Abstract—A novel unified Bayesian framework for network detection is developed, under which a detect...
We consider a continuous-time model for the evolution of social networks. A social network is here c...
We consider a continuous-time model for the evolution of social networks. A social network is here c...
We consider a continuous-time model for the evolution of social networks. A social network is here c...
We consider a continuous-time model for the evolution of social networks. A social network is here c...
We consider a continuous-time model for the evolution of social networks. A social network is here c...
Thesis (Ph.D.)--Boston UniversityThis dissertation focuses on two types of problems, both of which a...
Abstract—When working with large-scale network data, the interconnected entities often have addition...
As social networks take an ever-prominent role in information access, combating disinformation becom...
As social networks take an ever-prominent role in information access, combating disinformation becom...
Anomaly detection in dynamic communication networks has many important security applications. These ...
Dynamic networks, also called network streams, are an im-portant data representation that applies to...
In this work, we propose a new, fast and scalable method for anomaly detection in large time-evolvin...
Due to the proliferation of social networks and their significant effects on our day-to-day activiti...
We consider a continuous-time model for the evolution of social networks. A social network is here c...
Abstract—A novel unified Bayesian framework for network detection is developed, under which a detect...
We consider a continuous-time model for the evolution of social networks. A social network is here c...
We consider a continuous-time model for the evolution of social networks. A social network is here c...
We consider a continuous-time model for the evolution of social networks. A social network is here c...
We consider a continuous-time model for the evolution of social networks. A social network is here c...
We consider a continuous-time model for the evolution of social networks. A social network is here c...
Thesis (Ph.D.)--Boston UniversityThis dissertation focuses on two types of problems, both of which a...
Abstract—When working with large-scale network data, the interconnected entities often have addition...
As social networks take an ever-prominent role in information access, combating disinformation becom...
As social networks take an ever-prominent role in information access, combating disinformation becom...