Bei Guan

Orcid: 0000-0001-5071-1546

According to our database1, Bei Guan authored at least 26 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
CodeS: Natural Language to Code Repository via Multi-Layer Sketch.
CoRR, 2024

Improving Natural Language Capability of Code Large Language Model.
CoRR, 2024

A GAN-based data poisoning framework against anomaly detection in vertical federated learning.
CoRR, 2024

2023
Private-Library-Oriented Code Generation with Large Language Models.
CoRR, 2023

We Are Not So Similar: Alleviating User Representation Collapse in Social Recommendation.
Proceedings of the 2023 ACM International Conference on Multimedia Retrieval, 2023

Hierarchical and Contrastive Representation Learning for Knowledge-Aware Recommendation.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Large Language Models Meet NL2Code: A Survey.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

2022
When Neural Model Meets NL2Code: A Survey.
CoRR, 2022

S<sup>2</sup>QL: Retrieval Augmented Zero-Shot Question Answering over Knowledge Graph.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2022

Complex Question Answering over Incomplete Knowledge Graph as N-ary Link Prediction.
Proceedings of the International Joint Conference on Neural Networks, 2022

CERT: Continual Pre-training on Sketches for Library-oriented Code Generation.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Enhancing Sequential Recommendation via Decoupled Knowledge Graphs.
Proceedings of the Semantic Web - 19th International Conference, 2022

When Language Model Meets Private Library.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022

2021
Fed-EINI: An Efficient and Interpretable Inference Framework for Decision Tree Ensembles in Vertical Federated Learning.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference.
ACM Trans. Priv. Secur., 2020

2019
An Efficient Approach for Mitigating Covert Storage Channel Attacks in Virtual Machines by the Anti-Detection Criterion.
J. Comput. Sci. Technol., 2019

Research on Satellite Orbit Prediction Based on Neural Network Algorithm.
Proceedings of the 2019 3rd High Performance Computing and Cluster Technologies Conference (HPCCT 2019) and of the 2nd International Conference on Big Data and Artificial Intelligence (BDAI 2019), Guangzhou, China, June 22, 2019

2018
A Domain is only as Good as its Buddies: Detecting Stealthy Malicious Domains via Graph Inference.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

A Hybrid Recommendation Method with Multilayer Perception Applied on Real World Data.
Proceedings of the 2018 International Conference on Algorithms, 2018

2017
Killing Two Birds with One Stone: Malicious Domain Detection with High Accuracy and Coverage.
CoRR, 2017

2016
Discovering Malicious Domains through Passive DNS Data Graph Analysis.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
C2Hunter: Detection and Mitigation of Covert Channels in Data Centers.
Proceedings of the Handbook on Data Centers, 2015

2014
CIVSched: A Communication-Aware Inter-VM Scheduling Technique for Decreased Network Latency between Co-Located VMs.
IEEE Trans. Cloud Comput., 2014

2013
CIVSched: Communication-aware Inter-VM Scheduling in Virtual Machine Monitor Based on the Process.
Proceedings of the 13th IEEE/ACM International Symposium on Cluster, 2013

2012
A Novel Security Scheme for Online Banking Based on Virtual Machine.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Return-Oriented Programming Attack on the Xen Hypervisor.
Proceedings of the Seventh International Conference on Availability, 2012


  Loading...