2018 2nd International Conference on Inventive Systems and Control (ICISC) 2018
DOI: 10.1109/icisc.2018.8398937
|View full text |Cite
|
Sign up to set email alerts
|

BRNADS: Big data real-time node anomaly detection in social networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Many authors are doing research on social network datasets and proposing various anomaly detection mechanisms to identify anomalous activities in both static and dynamic growing social networks. 25 In this study, the current popular microblog data set is used for experiments. Based on the Big Five Model of Personality, 336 questions from 30 dimensions were evaluated for users, and the final test results are obtained.…”
Section: Source Of Datamentioning
confidence: 99%
“…Many authors are doing research on social network datasets and proposing various anomaly detection mechanisms to identify anomalous activities in both static and dynamic growing social networks. 25 In this study, the current popular microblog data set is used for experiments. Based on the Big Five Model of Personality, 336 questions from 30 dimensions were evaluated for users, and the final test results are obtained.…”
Section: Source Of Datamentioning
confidence: 99%
“…The results show that the proposed approach improves computation efficiency and scalability for principal score calculation. Manjunatha et al [75] proposed a dynamic mechanism to detect global outliers. For evaluation, three case studies from social network data were used and the results of the proposed method were evaluated in terms of F-score, precision, and recall.…”
Section: Unclassified Techniquesmentioning
confidence: 99%
“…CatchSync [13] detects fraud by analyzing node properties (e.g., degree, HITS score, edge betweenness). The work [2,22,38] detect fraud by analyzing fraudulent communities. GCNEXT [16] is a detection model using expanded balance theory and GCN.…”
Section: Introductionmentioning
confidence: 99%