Yi Han

Orcid: 0000-0001-6530-4564

Affiliations:
  • University of Melbourne, Department of Computing and Information Systems, Parkville, Australia (PhD 2015)


According to our database1, Yi Han authored at least 17 papers between 2013 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Propagation2Vec: Embedding partial propagation networks for explainable fake news early detection.
Inf. Process. Manag., 2021

Knowledge Enhanced Multi-modal Fake News Detection.
CoRR, 2021

Continual Learning for Fake News Detection from Social Media.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021

2020
Graph Neural Networks with Continual Learning for Fake News Detection from Social Media.
CoRR, 2020

Image Analysis Enhanced Event Detection from Geo-Tagged Tweet Streams.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020

Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Embedding Partial Propagation Network for Fake News Early Detection.
Proceedings of the CIKM 2020 Workshops co-located with 29th ACM International Conference on Information and Knowledge Management (CIKM 2020), 2020

2019
Power-law Verification for Event Detection at Multi-spatial Scales from Geo-tagged Tweet Streams.
CoRR, 2019

Adversarial Reinforcement Learning under Partial Observability in Software-Defined Networking.
CoRR, 2019

Multi-spatial Scale Event Detection from Geo-tagged Tweet Streams via Power-law Verification.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Reinforcement Learning for Autonomous Defence in Software-Defined Networking.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

Adequacy of the Gradient-Descent Method for Classifier Evasion Attacks.
Proceedings of the Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2017

2016
A Game Theoretical Approach to Defend Against Co-Resident Attacks in Cloud Computing: Preventing Co-Residence Using Semi-Supervised Learning.
IEEE Trans. Inf. Forensics Secur., 2016

2014
Virtual machine allocation policies against co-resident attacks in cloud computing.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Analysing Virtual Machine Usage in Cloud Computing.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Security Games for Virtual Machine Allocation in Cloud Computing.
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013


  Loading...