Shuhan Yuan

Orcid: 0000-0001-6816-419X

According to our database1, Shuhan Yuan authored at least 48 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Backdoor Attack against One-Class Sequential Anomaly Detection Models.
CoRR, 2024

2023
Algorithmic Recourse for Anomaly Detection in Multivariate Time Series.
CoRR, 2023

Robust Fraud Detection via Supervised Contrastive Learning.
CoRR, 2023

Achieving Counterfactual Fairness for Anomaly Detection.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023

Explainable Sequential Anomaly Detection via Prototypes.
Proceedings of the International Joint Conference on Neural Networks, 2023

On Root Cause Localization and Anomaly Mitigation through Causal Inference.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

Robust Fraud Detection via Supervised Contrastive Learning.
Proceedings of the IEEE International Conference on Big Data, 2023

LogGPT: Log Anomaly Detection via GPT.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
On Interpretable Anomaly Detection Using Causal Algorithmic Recourse.
CoRR, 2022

Fine-grained Anomaly Detection in Sequential Data via Counterfactual Explanations.
CoRR, 2022

Trustworthy Anomaly Detection: A Survey.
CoRR, 2022

Coded Hate Speech Detection via Contextual Information.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2022

Robust Hate Speech Detection via Mitigating Spurious Correlations.
Proceedings of the 2nd Conference of the Asia-Pacific Chapter of the Association for Computational Linguistics and the 12th International Joint Conference on Natural Language Processing, 2022

On the Convergence of the Monte Carlo Exploring Starts Algorithm for Reinforcement Learning.
Proceedings of the Tenth International Conference on Learning Representations, 2022

Few-shot Anomaly Detection and Classification Through Reinforced Data Selection.
Proceedings of the IEEE International Conference on Data Mining, 2022

Robust Unstructured Knowledge Access in Conversational Dialogue with ASR Errors.
Proceedings of the IEEE International Conference on Acoustics, 2022

Generating Textual Adversaries with Minimal Perturbation.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022

Contrastive Learning for Insider Threat Detection.
Proceedings of the Database Systems for Advanced Applications, 2022

Fraud Detection via Contrastive Positive Unlabeled Learning.
Proceedings of the IEEE International Conference on Big Data, 2022

Sequential Anomaly Detection with Local and Global Explanations.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
A novel self-learning feature selection approach based on feature attributions.
Expert Syst. Appl., 2021

Deep learning for insider threat detection: Review, challenges and opportunities.
Comput. Secur., 2021

LogBERT: Log Anomaly Detection via BERT.
Proceedings of the International Joint Conference on Neural Networks, 2021

Unsupervised Cross-system Log Anomaly Detection via Domain Adaptation.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

Hidden Buyer Identification in Darknet Markets via Dirichlet Hawkes Process.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Achieving Differential Privacy in Vertically Partitioned Multiparty Learning.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

InterpretableSAD: Interpretable Anomaly Detection in Sequential Log Data.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Few-shot Insider Threat Detection.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

2019
Identifying Hidden Buyers in Darknet Markets via Dirichlet Hawkes Process.
CoRR, 2019

Achieving Differential Privacy and Fairness in Logistic Regression.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

Dynamic Anomaly Detection Using Vector Autoregressive Model.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2019

Achieving Causal Fairness through Generative Adversarial Networks.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Insider Threat Detection via Hierarchical Neural Temporal Point Processes.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

FairGAN<sup>+</sup>: Achieving Fair Data Generation and Classification through Generative Adversarial Nets.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

SAFE: A Neural Survival Analysis Model for Fraud Early Detection.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

One-Class Adversarial Nets for Fraud Detection.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Incorporating pre-training in long short-term memory networks for tweet classification.
Soc. Netw. Anal. Min., 2018

On spectral analysis of directed signed graphs.
Int. J. Data Sci. Anal., 2018

Task-specific word identification from short texts using a convolutional neural network.
Intell. Data Anal., 2018

DPNE: Differentially Private Network Embedding.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018

FairGAN: Fairness-aware Generative Adversarial Networks.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Wikipedia Vandal Early Detection: From User Behavior to User Embedding.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2017

SNE: Signed Network Embedding.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2017

Differential Privacy Preserving Causal Graph Discovery.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Spectrum-based Deep Neural Networks for Fraud Detection.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

2016
Incorporating Pre-Training in Long Short-Term Memory Networks for Tweets Classification.
Proceedings of the IEEE 16th International Conference on Data Mining, 2016

A Two Phase Deep Learning Model for Identifying Discrimination from Tweets.
Proceedings of the 19th International Conference on Extending Database Technology, 2016

2015
A Knowledge Resources Based Neural Network for Learning Word and Relation Representations.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015


  Loading...