Xiao Yu

Affiliations:
  • University of Illinois at Urbana-Champaign, Urbana, IL, USA


According to our database1, Xiao Yu authored at least 39 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ProvIoT : Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Distantly-Supervised Joint Entity and Relation Extraction with Noise-Robust Learning.
CoRR, 2023

Uncertainty-Aware Bootstrap Learning for Joint Extraction on Distantly-Supervised Data.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), 2023

2021
SIGL: Securing Software Installations Through Deep Graph Learning.
Proceedings of the 30th USENIX Security Symposium, 2021

SEAL: Storage-efficient Causality Analysis on Enterprise Logs with Query-friendly Compression.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
Anomaly Detection on Web-User Behaviors Through Deep Learning.
Proceedings of the Security and Privacy in Communication Networks, 2020

You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Vessels: efficient and scalable deep learning prediction on trusted processors.
Proceedings of the SoCC '20: ACM Symposium on Cloud Computing, 2020

This is Why We Can't Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Heterogeneous Graph Matching Networks.
CoRR, 2019

Adversarial Defense Framework for Graph Neural Network.
CoRR, 2019

Heterogeneous Graph Matching Networks for Unknown Malware Detection.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

A Community-Enhanced Retrieval Model for Text-Rich Heterogeneous Information Networks.
Proceedings of the 2019 International Conference on Data Mining Workshops, 2019

2015
A Framework of Mining Trajectories from Untrustworthy Data in Cyber-Physical System.
ACM Trans. Knowl. Discov. Data, 2015

Classification with Active Learning and Meta-Paths in Heterogeneous Information Networks.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

2014
Entity recommendation and search in heterogeneous information networks
PhD thesis, 2014

Personalized entity recommendation: a heterogeneous information network approach.
Proceedings of the Seventh ACM International Conference on Web Search and Data Mining, 2014

On building entity recommender systems using user click log and freebase knowledge.
Proceedings of the Seventh ACM International Conference on Web Search and Data Mining, 2014

Heterogeneous graph-based intent learning with queries, web pages and Wikipedia concepts.
Proceedings of the Seventh ACM International Conference on Web Search and Data Mining, 2014

ClusCite: effective citation recommendation by information network-based clustering.
Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014

2013
PathSelClus: Integrating Meta-Path Selection with User-Guided Object Clustering in Heterogeneous Information Networks.
ACM Trans. Knowl. Discov. Data, 2013

Trustworthiness analysis of sensor data in cyber-physical systems.
J. Comput. Syst. Sci., 2013

Research-insight: providing insight on research by publication network analysis.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2013

Recommendation in heterogeneous information networks with implicit user feedback.
Proceedings of the Seventh ACM Conference on Recommender Systems, 2013

Mining lines in the sand: on trajectory discovery from untrustworthy data in cyber-physical system.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013

Content coverage maximization on word networks for hierarchical topic summarization.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

2012
Multidimensional Sensor Data Analysis in Cyber-Physical System: An Atypical Cube Approach.
Int. J. Distributed Sens. Networks, 2012

Citation Prediction in Heterogeneous Bibliographic Networks.
Proceedings of the Twelfth SIAM International Conference on Data Mining, 2012

IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems.
Proceedings of the Twelfth SIAM International Conference on Data Mining, 2012

Query-driven discovery of semantically similar substructures in heterogeneous networks.
Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2012

Integrating meta-path selection with user-guided object clustering in heterogeneous information networks.
Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2012

Multidimensional Analysis of Atypical Events in Cyber-Physical Data.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

User guided entity similarity search using meta-path selection in heterogeneous information networks.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

2011
Retrieving k-Nearest Neighboring Trajectories by a Set of Point Locations.
Proceedings of the Advances in Spatial and Temporal Databases, 2011

WINACS: construction and analysis of web-based computer science information networks.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2011

LikeMiner: a system for mining the power of 'like' in social media networks.
Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2011

Geo-Friends Recommendation in GPS-based Cyber-physical Social Network.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2011

2010
Tru-Alarm: Trustworthiness Analysis of Sensor Networks in Cyber-Physical Systems.
Proceedings of the ICDM 2010, 2010

2009
Filtering and Refinement: A Two-Stage Approach for Efficient and Effective Anomaly Detection.
Proceedings of the ICDM 2009, 2009


  Loading...