Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/icdm/ShahBGF14
%A Shah, Neil
%A Beutel, Alex
%A Gallagher, Brian
%A Faloutsos, Christos
%B ICDM
%D 2014
%E Kumar, Ravi
%E Toivonen, Hannu
%E Pei, Jian
%E Huang, Joshua Zhexue
%E Wu, Xindong
%I IEEE Computer Society
%K dblp
%P 959-964
%T Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective.
%U http://dblp.uni-trier.de/db/conf/icdm/icdm2014.html#ShahBGF14
%@ 978-1-4799-4302-9
@inproceedings{conf/icdm/ShahBGF14,
added-at = {2023-03-24T00:00:00.000+0100},
author = {Shah, Neil and Beutel, Alex and Gallagher, Brian and Faloutsos, Christos},
biburl = {https://www.bibsonomy.org/bibtex/2dd33ef870419959419da864a6c9bdc30/dblp},
booktitle = {ICDM},
crossref = {conf/icdm/2014},
editor = {Kumar, Ravi and Toivonen, Hannu and Pei, Jian and Huang, Joshua Zhexue and Wu, Xindong},
ee = {https://doi.ieeecomputersociety.org/10.1109/ICDM.2014.36},
interhash = {3194fe35ffcb06e3414970e19e6765a1},
intrahash = {dd33ef870419959419da864a6c9bdc30},
isbn = {978-1-4799-4302-9},
keywords = {dblp},
pages = {959-964},
publisher = {IEEE Computer Society},
timestamp = {2024-04-10T18:12:28.000+0200},
title = {Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective.},
url = {http://dblp.uni-trier.de/db/conf/icdm/icdm2014.html#ShahBGF14},
year = 2014
}