Author of the publication

Robust Fraud Detection via Supervised Contrastive Learning.

, , and . IEEE Big Data, page 1279-1288. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Unstructured Knowledge Access in Conversational Dialogue with ASR Errors., , , , , and . ICASSP, page 6702-6706. IEEE, (2022)Contrastive Learning for Insider Threat Detection., , and . DASFAA (1), volume 13245 of Lecture Notes in Computer Science, page 395-403. Springer, (2022)Hidden Buyer Identification in Darknet Markets via Dirichlet Hawkes Process., , , and . IEEE BigData, page 581-589. IEEE, (2021)Insider Threat Detection via Hierarchical Neural Temporal Point Processes., , , and . IEEE BigData, page 1343-1350. IEEE, (2019)LogBERT: Log Anomaly Detection via BERT., , and . IJCNN, page 1-8. IEEE, (2021)LogGPT: Log Anomaly Detection via GPT., , and . IEEE Big Data, page 1117-1122. IEEE, (2023)Discovering and Mitigating Indirect Bias in Attention-Based Model Explanations., , and . NAACL-HLT (Findings), page 1599-1614. Association for Computational Linguistics, (2024)Generating Textual Adversaries with Minimal Perturbation., , , and . EMNLP (Findings), page 4599-4606. Association for Computational Linguistics, (2022)SNE: Signed Network Embedding., , and . PAKDD (2), volume 10235 of Lecture Notes in Computer Science, page 183-195. (2017)Wikipedia Vandal Early Detection: From User Behavior to User Embedding., , , and . ECML/PKDD (1), volume 10534 of Lecture Notes in Computer Science, page 832-846. Springer, (2017)