Detalhes
Nome
Shazia TabassumCluster
InformáticaCargo
Investigador AuxiliarDesde
01 abril 2015
Nacionalidade
PortugalCentro
Laboratório de Inteligência Artificial e Apoio à DecisãoContactos
+351220402963
shazia.tabassum@inesctec.pt
2020
Autores
Tabassum, S; Veloso, B; Gama, J;
Publicação
NETWORK SCIENCE
Abstract
The link prediction task has found numerous applications in real-world scenarios. However, in most of the cases like interactions, purchases, mobility, etc., links can re-occur again and again across time. As a result, the data being generated is excessively large to handle, associated with the complexity and sparsity of networks. Therefore, we propose a very fast, memory-less, and dynamic sampling-based method for predicting recurring links for a successive future point in time. This method works by biasing the links exponentially based on their time of occurrence, frequency, and stability. To evaluate the efficiency of our method, we carried out rigorous experiments with massive real-world graph streams. Our empirical results show that the proposed method outperforms the state-of-the-art method for recurring links prediction. Additionally, we also empirically analyzed the evolution of links with the perspective of multi-graph topology and their recurrence probability over time. © 2020 Cambridge University Press.
2020
Autores
Veloso, B; Tabassum, S; Martins, C; Espanha, R; Azevedo, R; Gama, J;
Publicação
ANNALS OF TELECOMMUNICATIONS
Abstract
2020
Autores
Tabassum, S; Azad, MA; Gama, J;
Publicação
ANNALS OF TELECOMMUNICATIONS
Abstract
Fraud in telephony incurs huge revenue losses and causes a menace to both the service providers and legitimate users. This problem is growing alongside augmenting technologies. Yet, the works in this area are hindered by the availability of data and confidentiality of approaches. In this work, we deal with the problem of detecting different types of unsolicited users from spammers to fraudsters in a massive phone call network. Most of the malicious users in telecommunications have some of the characteristics in common. These characteristics can be defined by a set of features whose values are uncommon for normal users. We made use of graph-based metrics to detect profiles that are significantly far from the common user profiles in a real data log with millions of users. To achieve this, we looked for the high leverage points in the 99.99th percentile, which identified a substantial number of users as extreme anomalous points. Furthermore, clustering these points helped distinguish malicious users efficiently and minimized the problem space significantly. Convincingly, the learned profiles of these detected users coincided with fraudulent behaviors.
2019
Autores
Pereira, FSF; Tabassum, S; Gama, J; de Amo, S; Oliveira, GMB;
Publicação
Studies in Big Data
Abstract
2018
Autores
Tabassum, S; Pereira, FSF; Silva Fernandes, Sd; Gama, J;
Publicação
Wiley Interdisc. Rew.: Data Mining and Knowledge Discovery
Abstract
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.