{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T22:51:18Z","timestamp":1753051878691,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,13]]},"DOI":"10.1145\/3308558.3313403","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"83-93","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["No Place to Hide: Catching Fraudulent Entities in Tensors"],"prefix":"10.1145","author":[{"given":"Ban","family":"Yikun","sequence":"first","affiliation":[{"name":"Peking University, China"}]},{"given":"Liu","family":"Xin","sequence":"additional","affiliation":[{"name":"Tsinghua University, China"}]},{"given":"Huang","family":"Ling","sequence":"additional","affiliation":[{"name":"Fintec.ai, China"}]},{"given":"Duan","family":"Yitao","sequence":"additional","affiliation":[{"name":"Netease Youdao Inc., China"}]},{"given":"Liu","family":"Xue","sequence":"additional","affiliation":[{"name":"McGill University, Canada"}]},{"given":"Xu","family":"Wei","sequence":"additional","affiliation":[{"name":"Tsinghua University, China"}]}],"member":"320","published-online":{"date-parts":[[2019,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"1999. Kdd cup 1999 data. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html..  1999. Kdd cup 1999 data. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html.."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098026"},{"volume-title":"Opinion Fraud Detection in Online Reviews by Network Effects","author":"Akoglu Leman","key":"e_1_3_2_1_3_1","unstructured":"Leman Akoglu , Rishi Chandy , and Christos Faloutsos . 2013. Opinion Fraud Detection in Online Reviews by Network Effects .. In ICWSM. The AAAI Press . Leman Akoglu, Rishi Chandy, and Christos Faloutsos. 2013. Opinion Fraud Detection in Online Reviews by Network Effects.. In ICWSM. The AAAI Press."},{"key":"e_1_3_2_1_4_1","volume-title":"Usenix Security Symposium on Usenix Security Symposium. 1132-1141","author":"Anderson David S","year":"2007","unstructured":"David S Anderson , Chris Fleizach , Stefan Savage , and Geoffrey M Voelker . 2007 . Spamscatter: characterizing internet scam hosting infrastructure . In Usenix Security Symposium on Usenix Security Symposium. 1132-1141 . David S Anderson, Chris Fleizach, Stefan Savage, and Geoffrey M Voelker. 2007. Spamscatter: characterizing internet scam hosting infrastructure. In Usenix Security Symposium on Usenix Security Symposium. 1132-1141."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660269"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/646688.702972"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.271"},{"key":"e_1_3_2_1_8_1","first-page":"576","article-title":"Combating web spam with trustrank","author":"Garcia-Molina Hector","year":"2004","unstructured":"Hector Garcia-Molina and Jan Pedersen . 2004 . Combating web spam with trustrank . In VLDB. 576 - 587 . Hector Garcia-Molina and Jan Pedersen. 2004. Combating web spam with trustrank. In VLDB. 576-587.","journal-title":"VLDB."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187846"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939747"},{"key":"e_1_3_2_1_12_1","volume-title":"Spotting Suspicious Behaviors in Multimodal Data: A General Metric and Algorithms","author":"Jiang Meng","year":"2016","unstructured":"Meng Jiang , Alex Beutel , Peng Cui , Bryan Hooi , Shiqiang Yang , and Christos Faloutsos . 2016. Spotting Suspicious Behaviors in Multimodal Data: A General Metric and Algorithms . IEEE TKDE 28, 8 ( 2016 ), 2187-2200. Meng Jiang, Alex Beutel, Peng Cui, Bryan Hooi, Shiqiang Yang, and Christos Faloutsos. 2016. Spotting Suspicious Behaviors in Multimodal Data: A General Metric and Algorithms. IEEE TKDE28, 8 (2016), 2187-2200."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623632"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-015-0883-y"},{"key":"e_1_3_2_1_15_1","unstructured":"McAuley Julian. {n. d.}. Amazon product data. http:\/\/jmcauley.ucsd.edu\/data\/amazon\/.  McAuley Julian. {n. d.}. Amazon product data. http:\/\/jmcauley.ucsd.edu\/data\/amazon\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02927-1_50"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1137\/07070111X"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Victor E. Lee Ruan Ning Ruoming Jin and Charu Aggarwal. 2010. A Survey of Algorithms for Dense Subgraph Discovery. 303-336 pages.  Victor E. Lee Ruan Ning Ruoming Jin and Charu Aggarwal. 2010. A Survey of Algorithms for Dense Subgraph Discovery. 303-336 pages.","DOI":"10.1007\/978-1-4419-6045-0_10"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00","volume":"2","author":"Lippmann R. P.","unstructured":"R. P. Lippmann , D. J. Fried , I. Graf , J. W. Haines , K. R. Kendall , D. McClung , D. Weber , S. E. Webster , D. Wyschogrod , R. K. Cunningham , and M. A. Zissman . 2000. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation . In Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00 , Vol. 2 . 12-26 vol.2. R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall, D. McClung, D. Weber, S. E. Webster, D. Wyschogrod, R. K. Cunningham, and M. A. Zissman. 2000. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation. In Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, Vol. 2. 12-26 vol.2."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2011.80"},{"key":"e_1_3_2_1_21_1","first-page":"409","volume-title":"Proceedings of the 7th International Conference on Weblogs and Social Media, ICWSM","author":"Mukherjee Arjun","year":"2013","unstructured":"Arjun Mukherjee , Vivek Venkataraman , Bing Liu , and Natalie Glance . 2013 . What yelp fake review filter might be doing? . In Proceedings of the 7th International Conference on Weblogs and Social Media, ICWSM 2013. AAAI press, 409 - 418 . Arjun Mukherjee, Vivek Venkataraman, Bing Liu, and Natalie Glance. 2013. What yelp fake review filter might be doing?. In Proceedings of the 7th International Conference on Weblogs and Social Media, ICWSM 2013. AAAI press, 409-418."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242600"},{"key":"e_1_3_2_1_23_1","first-page":"521","article-title":"ParCube: sparse parallelizable tensor decompositions","author":"Papalexakis Evangelos E.","year":"2012","unstructured":"Evangelos E. Papalexakis , Christos Faloutsos , and Nicholas D. Sidiropoulos . 2012 . ParCube: sparse parallelizable tensor decompositions . In PKDD. 521 - 536 . Evangelos E. Papalexakis, Christos Faloutsos, and Nicholas D. Sidiropoulos. 2012. ParCube: sparse parallelizable tensor decompositions. In PKDD. 521-536.","journal-title":"PKDD."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13672-6_42"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783370"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12683-3_30"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.36"},{"key":"e_1_3_2_1_28_1","volume-title":"A mathematical theory of communication. Bell Labs Technical Journal27, 4","author":"Shannon C. E","year":"1948","unstructured":"C. E Shannon . 1948. A mathematical theory of communication. Bell Labs Technical Journal27, 4 ( 1948 ), 379-423. C. E Shannon. 1948. A mathematical theory of communication. Bell Labs Technical Journal27, 4 (1948), 379-423."},{"key":"e_1_3_2_1_29_1","first-page":"469","article-title":"CoreScope: Graph Mining Using k-Core Analysis - Patterns, Anomalies and Algorithms","volume":"00","author":"Shin K.","year":"2017","unstructured":"K. Shin , T. Eliassi-Rad , and C. Faloutsos . 2017 . CoreScope: Graph Mining Using k-Core Analysis - Patterns, Anomalies and Algorithms . In ICDM , Vol. 00. 469 - 478 . K. Shin, T. Eliassi-Rad, and C. Faloutsos. 2017. CoreScope: Graph Mining Using k-Core Analysis - Patterns, Anomalies and Algorithms. In ICDM, Vol. 00. 469-478.","journal-title":"ICDM"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46128-1_17"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3154414"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3018661.3018676"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.78"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.08.137"},{"key":"e_1_3_2_1_35_1","volume-title":"Journal of Computational Information Systems (2009)","author":"Tang Hua","year":"2009","unstructured":"Hua Tang and Zhuolin Cao . 2009 . Machine Learning-based Intrusion Detection Algorithms . Journal of Computational Information Systems (2009) , 1825-1831. Hua Tang and Zhuolin Cao. 2009. Machine Learning-based Intrusion Detection Algorithms. Journal of Computational Information Systems (2009), 1825-1831."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660321"},{"key":"e_1_3_2_1_37_1","volume-title":"Alexander Smola, and Animashree Anandkumar.","author":"Wang Yining","year":"2015","unstructured":"Yining Wang , Hsiao Yu Tung , Alexander Smola, and Animashree Anandkumar. 2015 . Fast and Guaranteed Tensor Decomposition via Sketching. NIPS. Yining Wang, Hsiao Yu Tung, Alexander Smola, and Animashree Anandkumar. 2015. Fast and Guaranteed Tensor Decomposition via Sketching. NIPS."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488400"},{"key":"e_1_3_2_1_39_1","first-page":"2","article-title":"Resilient distributed datasets: a fault-tolerant abstraction for in-memory cluster computing","author":"Zaharia Matei","year":"2012","unstructured":"Matei Zaharia , Mosharaf Chowdhury , Tathagata Das , Ankur Dave , Justin Ma , Murphy Mccauley , Michael J. Franklin , Scott Shenker , and Ion Stoica . 2012 . Resilient distributed datasets: a fault-tolerant abstraction for in-memory cluster computing . In Usenix NSDI. 2 - 2 . Matei Zaharia, Mosharaf Chowdhury, Tathagata Das, Ankur Dave, Justin Ma, Murphy Mccauley, Michael J. Franklin, Scott Shenker, and Ion Stoica. 2012. Resilient distributed datasets: a fault-tolerant abstraction for in-memory cluster computing. In Usenix NSDI. 2-2.","journal-title":"Usenix NSDI."}],"event":{"name":"WWW '19: The Web Conference","sponsor":["IW3C2 International World Wide Web Conference Committee"],"location":"San Francisco CA USA","acronym":"WWW '19"},"container-title":["The World Wide Web Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308558.3313403","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3308558.3313403","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:17Z","timestamp":1750208537000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308558.3313403"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,13]]},"references-count":38,"alternative-id":["10.1145\/3308558.3313403","10.1145\/3308558"],"URL":"https:\/\/doi.org\/10.1145\/3308558.3313403","relation":{},"subject":[],"published":{"date-parts":[[2019,5,13]]},"assertion":[{"value":"2019-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}