#### Filter Results:

- Full text PDF available (8)

#### Publication Year

2014

2018

- This year (6)
- Last 5 years (28)
- Last 10 years (28)

#### Publication Type

#### Co-author

#### Journals and Conferences

Learn More

- Kijung Shin, Jinhong Jung, Lee Sael, U. Kang
- SIGMOD Conference
- 2015

Given a large graph, how can we calculate the relevance between nodes fast and accurately? Random walk with restart (RWR) provides a good measure for this purpose and has been applied to diverse dataâ€¦ (More)

- Kijung Shin, U. Kang
- ArXiv
- 2014

Given a bipartite graph of users and the products that they review, or followers and followees, how can we detect fake reviews or follows? Existing fraud detection methods (spectral, etc.) try toâ€¦ (More)

- Kijung Shin, Bryan Hooi, Christos Faloutsos
- ECML/PKDD
- 2016

Given a large-scale and high-order tensor, how can we find dense blocks in it? Can we find them in near-linear time but with a quality guarantee? Extensive previous work has shown that dense blocksâ€¦ (More)

- Jinhong Jung, Kijung Shin, Lee Sael, U. Kang
- ACM Trans. Database Syst.
- 2016

Given a large graph, how can we calculate the relevance between nodes fast and accurately? Random walk with restart (RWR) provides a good measure for this purpose and has been applied to diverse dataâ€¦ (More)

- Kijung Shin, Lee Sael, U. Kang
- IEEE Transactions on Knowledge and Dataâ€¦
- 2017

Given a high-order large-scale tensor, how can we decompose it into latent factors? Can we process it on commodity computers with limited memory? These questions are closely related to recommenderâ€¦ (More)

Multi-aspect data appear frequently in many web-related applications. For example, product reviews are quadruplets of (user, product, keyword, timestamp). How can we analyze such web-scaleâ€¦ (More)

- Kijung Shin, Bryan Hooi, Jisu Kim, Christos Faloutsos
- WSDM
- 2017

How can we detect fraudulent lockstep behavior in large-scale multi-aspect data (i.e., tensors)? Can we detect it when data are too large to fit in memory or even on a disk? Past studies have shownâ€¦ (More)

- Kijung Shin, Bryan Hooi, Jisu Kim, Christos Faloutsos
- KDD
- 2017

Consider a stream of retweet events - how can we spot fraudulent lock-step behavior in such multi-aspect data (i.e., tensors) evolving over time? Can we detect it in real time, with an accuracyâ€¦ (More)

- Kijung Shin, Tina Eliassi-Rad, Christos Faloutsos
- 2016 IEEE 16th International Conference on Dataâ€¦
- 2016

How do the k-core structures of real-world graphs look like? What are the common patterns and the anomalies? How can we use them for algorithm design and applications? A k-core is the maximalâ€¦ (More)