Author:
Modell Alexander,Larson Jonathan,Turcotte Melissa,Bertiger Anna
Reference49 articles.
1. Anomaly detection
2. Asymmetric Transitivity Preserving Graph Embedding
3. node2vec
4. DeepWalk
5. Neural word embedding as implicit matrix factorization;levy;Advances in neural information processing systems,2014
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. General-Purpose User Modeling with Behavioral Logs: A Snapchat Case Study;Proceedings of the 47th International ACM SIGIR Conference on Research and Development in Information Retrieval;2024-07-10
2. A Graph-based Framework for Reducing False Positives in Authentication Alerts in Security Systems;Companion Proceedings of the ACM Web Conference 2024;2024-05-13
3. Behavioral authentication for security and safety;Security and Safety;2024