Author of the publication

Few-shot Network Anomaly Detection via Cross-network Meta-learning.

, , , and . WWW, page 2448-2456. ACM / IW3C2, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Brief Review of Network Embedding., , , , and . Big Data Min. Anal., 2 (1): 35-47 (2019)Random walk with restart: fast solutions and applications., , and . Knowl. Inf. Syst., 14 (3): 327-346 (2008)Guiding supervised topic modeling for content based tag recommendation., , , , , and . Neurocomputing, (2018)SelfTrust: leveraging self-assessment for trust inference in Internetware., , , , and . Sci. China Inf. Sci., 56 (10): 1-14 (2013)BL-GAN: Semi-Supervised Bug Localization via Generative Adversarial Network., , , and . IEEE Trans. Knowl. Data Eng., 35 (11): 11112-11125 (November 2023)Graph Vulnerability and Robustness: A Survey., , , , and . IEEE Trans. Knowl. Data Eng., 35 (6): 5915-5934 (June 2023)Auditing the Sensitivity of Graph-based Ranking with Visual Analytics., , , , and . IEEE Trans. Vis. Comput. Graph., 27 (2): 1459-1469 (2021)Calliope-Net: Automatic Generation of Graph Data Facts via Annotated Node-Link Diagrams., , , , , , and . IEEE Trans. Vis. Comput. Graph., 30 (1): 562-572 (January 2024)FairGen: Towards Fair Graph Generation., , , , , and . CoRR, (2023)Detecting Topology Attacks against Graph Neural Networks., , , , , and . CoRR, (2022)