2016
DOI: 10.1002/cpe.3769
|View full text |Cite
|
Sign up to set email alerts
|

Parallel algorithms for anomalous subgraph detection

Abstract: Summary For the many application domains concerning entities and their connections, often their data can be formally represented as graphs and an important problem is detecting an anomalous subgraph within it. Numerous methods have been proposed to speed‐up anomalous subgraph detection; however, each incurs non‐trivial costs on detection accuracy. In this paper, we formulate the anomalous subgraph detection problem as the maximization of a non‐parametric scan statistic and then approximate it to a submodular m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
5
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 20 publications
(37 reference statements)
0
5
1
Order By: Relevance
“…Another area where parallel algorithms have been developed is for dense subgraph enumeration. There are several implementations for finding maximal cliques in parallel by careful partitioning, pruning and backtracking heuristics [9], [25], [10], [26], [11]. Our results do not extend to the clique enumeration problem.…”
Section: Related Workcontrasting
confidence: 56%
See 1 more Smart Citation
“…Another area where parallel algorithms have been developed is for dense subgraph enumeration. There are several implementations for finding maximal cliques in parallel by careful partitioning, pruning and backtracking heuristics [9], [25], [10], [26], [11]. Our results do not extend to the clique enumeration problem.…”
Section: Related Workcontrasting
confidence: 56%
“…Finally, there are only two prior works on parallel graph scan statistics [19], [25]. However, these do not scale to very large instances.…”
Section: Related Workmentioning
confidence: 99%
“…[ 5 ] demonstrated that by applying an anomaly detection algorithm on call recording logs of a country’s mobile network, they could classify events appearing in a particular time period as emergencies or not. While the majority of the conducted studies are mainly focused on uncovering anomalous vertices, only a handful focus on detecting anomalous communities [ 7 , 13 , 33 , 45 , 48 , 53 , 59 , 70 ].…”
Section: Introductionmentioning
confidence: 99%
“…Social network analysis is not limited to sociology or even the social sciences. The relationships between users can be studied in political science, economics, and engineering . However, until very recently, very thin research tradition does not fit into dominant paradigms.…”
Section: Introductionmentioning
confidence: 99%