Author:
Bindu P. V.,Mishra Rahul,Thilagam P. Santhi
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Computer Networks and Communications,Hardware and Architecture,Information Systems,Software
Reference42 articles.
1. Aha, D.W., Kibler, D., Albert, M.K. (1991). Instance-based learning algorithms. Machine learning, 6(1), 37–66.
2. Baumes, J., Goldberg, M., Magdon-Ismail, M. (2005). Efficient identification of overlapping communities. In International Conference on Intelligence and Security Informatics (pp. 27–36). Springer.
3. Baumes, J., Goldberg, M., Magdon-Ismail, M., Al Wallace, W. (2004). Discovering hidden groups in communication networks. In International Conference on Intelligence and Security Informatics (pp. 378–389). Springer.
4. Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V. (2010). Detecting spammers on twitter. In Collaboration, electronic messaging, anti-abuse and spam conference (CEAS) (Vol. 6 p. 12).
5. Benevenuto, F., Rodrigues, T., Almeida, V., Almeida, J., Zhang, C., Ross, K. (2008). Identifying video spammers in online social networks. In Proceedings of the 4th international workshop on adversarial information retrieval on the web (pp. 45–52). ACM.
Cited by
32 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献