Alex Beutel

According to our database1, Alex Beutel
  • authored at least 43 papers between 2010 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Latent Cross: Making Use of Context in Recurrent Recommender Systems.
Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, 2018

The Case for Learned Index Structures.
Proceedings of the 2018 International Conference on Management of Data, 2018

Q&R: A Two-Stage Approach toward Interactive Recommendation.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

Factorized Recurrent Neural Architectures for Longer Range Dependence.
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2018

2017
Graph-Based Fraud Detection in the Face of Camouflage.
TKDD, 2017

The Case for Learned Index Structures.
CoRR, 2017

OEC: Open-Ended Classification for Future-Proof Link-Fraud Detection.
CoRR, 2017

Data Decisions and Theoretical Implications when Adversarially Learning Fair Representations.
CoRR, 2017

Beyond Globally Optimal: Focused Learning for Improved Recommendations.
Proceedings of the 26th International Conference on World Wide Web, 2017

Recurrent Recommender Networks.
Proceedings of the Tenth ACM International Conference on Web Search and Data Mining, 2017

The Many Faces of Link Fraud.
Proceedings of the 2017 IEEE International Conference on Data Mining, 2017

2016
TerraNNI: Natural Neighbor Interpolation on 2D and 3D Grids Using a GPU.
ACM Trans. Spatial Algorithms and Systems, 2016

Spotting Suspicious Behaviors in Multimodal Data: A General Metric and Algorithms.
IEEE Trans. Knowl. Data Eng., 2016

Catching Synchronized Behaviors in Large Networks: A Graph Mining Approach.
TKDD, 2016

Inferring lockstep behavior from connectivity pattern in large graphs.
Knowl. Inf. Syst., 2016

Explaining Reviews and Ratings with PACO: Poisson Additive Co-Clustering.
Proceedings of the 25th International Conference on World Wide Web, 2016

BIRDNEST: Bayesian Inference for Ratings-Fraud Detection.
Proceedings of the 2016 SIAM International Conference on Data Mining, 2016

FRAUDAR: Bounding Graph Fraud in the Face of Camouflage.
Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016

EdgeCentric: Anomaly Detection in Edge-Attributed Networks.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2016

2015
Explaining reviews and ratings with PACO: Poisson Additive Co-Clustering.
CoRR, 2015

EdgeCentric: Anomaly Detection in Edge-Attributed Networks.
CoRR, 2015

BIRDNEST: Bayesian Inference for Ratings-Fraud Detection.
CoRR, 2015

ACCAMS: Additive Co-Clustering to Approximate Matrices Succinctly.
CoRR, 2015

ACCAMS: Additive Co-Clustering to Approximate Matrices Succinctly.
Proceedings of the 24th International Conference on World Wide Web, 2015

ND-Sync: Detecting Synchronized Fraud Activities.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015

Graph-Based User Behavior Modeling: From Prediction to Fraud Detection.
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2015

A General Suspiciousness Metric for Dense Blocks in Multimodal Data.
Proceedings of the 2015 IEEE International Conference on Data Mining, 2015

Fraud Detection through Graph-Based User Behavior Modeling.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Network Anomaly Detection Using Co-clustering.
Encyclopedia of Social Network Analysis and Mining, 2014

Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective.
CoRR, 2014

Detecting suspicious following behavior in multimillion-node social networks.
Proceedings of the 23rd International World Wide Web Conference, 2014

CoBaFi: collaborative bayesian filtering.
Proceedings of the 23rd International World Wide Web Conference, 2014

FlexiFaCT: Scalable Flexible Factorization of Coupled Tensors on Hadoop.
Proceedings of the 2014 SIAM International Conference on Data Mining, 2014

Inferring Strange Behavior from Connectivity Pattern in Social Networks.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014

CatchSync: catching synchronized behavior in large directed graphs.
Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014

Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective.
Proceedings of the 2014 IEEE International Conference on Data Mining, 2014

Fugue: Slow-Worker-Agnostic Distributed Learning for Big Models on Big Data.
Proceedings of the Seventeenth International Conference on Artificial Intelligence and Statistics, 2014

2013
CopyCatch: stopping group attacks by spotting lockstep behavior in social networks.
Proceedings of the 22nd International World Wide Web Conference, 2013

2012
Winner takes all: competing viruses or ideas on fair-play networks.
Proceedings of the 21st World Wide Web Conference 2012, 2012

Interacting viruses in networks: can both survive?
Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2012

Network Anomaly Detection Using Co-clustering.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

2011
TerraNNI: natural neighbor interpolation on a 3D grid using a GPU.
Proceedings of the 19th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2011

2010
Natural neighbor interpolation based grid DEM construction using a GPU.
Proceedings of the 18th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2010


  Loading...