Login / Signup

From Classic GNNs to Hyper-GNNs for Detecting Camouflaged Malicious Actors.

Venus Haghighi
Published in: WSDM (2023)
Keyphrases
  • malicious activities
  • detect malicious
  • detecting malicious
  • social networks
  • database
  • information retrieval
  • information systems
  • image processing
  • face recognition
  • evolutionary algorithm
  • malicious behavior