


default search action
Shuhan Yuan
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Feng Chen, Shuhan Yuan, Jilin Hu
, Cheng-Te Li, Rudy Raymond, Lidan Shou:
Editorial: Rising stars in data mining and management 2022. Frontiers Big Data 6 (2024) - [c41]Vinay M. S., Shuhan Yuan, Xintao Wu
:
Contrastive Learning for Fraud Detection from Noisy Labels. ICDE 2024: 1421-1434 - [c40]Xingyi Zhao, Depeng Xu, Shuhan Yuan:
Defense against Backdoor Attack on Pre-trained Language Models via Head Pruning and Attention Normalization. ICML 2024 - [c39]Farsheed Haque, Depeng Xu
, Shuhan Yuan:
Discovering and Mitigating Indirect Bias in Attention-Based Model Explanations. NAACL-HLT (Findings) 2024: 1599-1614 - [c38]He Cheng
, Shuhan Yuan
:
Backdoor Attack Against One-Class Sequential Anomaly Detection Models. PAKDD (3) 2024: 262-274 - [c37]He Cheng, Depeng Xu, Shuhan Yuan, Xintao Wu:
Achieving Counterfactual Explanation for Sequence Anomaly Detection. ECML/PKDD (8) 2024: 19-35 - [i23]He Cheng, Shuhan Yuan:
Backdoor Attack against One-Class Sequential Anomaly Detection Models. CoRR abs/2402.10283 (2024) - [i22]He Cheng, Depeng Xu, Shuhan Yuan:
BadSAD: Clean-Label Backdoor Attacks against Deep Semi-Supervised Anomaly Detection. CoRR abs/2412.13324 (2024) - 2023
- [c36]Xiao Han, Shuhan Yuan, Mohamed Trabelsi:
LogGPT: Log Anomaly Detection via GPT. IEEE Big Data 2023: 1117-1122 - [c35]M. S. Vinay, Shuhan Yuan, Xintao Wu
:
Robust Fraud Detection via Supervised Contrastive Learning. IEEE Big Data 2023: 1279-1288 - [c34]Xiao Han
, Lu Zhang
, Yongkai Wu
, Shuhan Yuan
:
On Root Cause Localization and Anomaly Mitigation through Causal Inference. CIKM 2023: 699-708 - [c33]He Cheng, Depeng Xu
, Shuhan Yuan
:
Explainable Sequential Anomaly Detection via Prototypes. IJCNN 2023: 1-8 - [c32]Xiao Han, Lu Zhang
, Yongkai Wu
, Shuhan Yuan
:
Achieving Counterfactual Fairness for Anomaly Detection. PAKDD (1) 2023: 55-66 - [i21]Xiao Han, Lu Zhang, Yongkai Wu, Shuhan Yuan:
Achieving Counterfactual Fairness for Anomaly Detection. CoRR abs/2303.02318 (2023) - [i20]Vinay M. S., Shuhan Yuan, Xintao Wu:
Robust Fraud Detection via Supervised Contrastive Learning. CoRR abs/2308.10055 (2023) - [i19]Xiao Han, Shuhan Yuan, Mohamed Trabelsi:
LogGPT: Log Anomaly Detection via GPT. CoRR abs/2309.14482 (2023) - [i18]Xiao Han, Lu Zhang, Yongkai Wu
, Shuhan Yuan:
Algorithmic Recourse for Anomaly Detection in Multivariate Time Series. CoRR abs/2309.16896 (2023) - 2022
- [j6]Panpan Zheng, Shuhan Yuan
, Xintao Wu
:
Using Dirichlet Marked Hawkes Processes for Insider Threat Detection. DTRAP 3(1): 5:1-5:19 (2022) - [c31]He Cheng
, Depeng Xu
, Shuhan Yuan
:
Sequential Anomaly Detection with Local and Global Explanations. IEEE Big Data 2022: 1212-1217 - [c30]Vinay M. S., Shuhan Yuan
, Xintao Wu
:
Fraud Detection via Contrastive Positive Unlabeled Learning. IEEE Big Data 2022: 1475-1484 - [c29]M. S. Vinay
, Shuhan Yuan
, Xintao Wu
:
Contrastive Learning for Insider Threat Detection. DASFAA (1) 2022: 395-403 - [c28]Xingyi Zhao, Lu Zhang, Depeng Xu, Shuhan Yuan:
Generating Textual Adversaries with Minimal Perturbation. EMNLP (Findings) 2022: 4599-4606 - [c27]Yik-Cheung Tam, Jiacheng Xu, Jiakai Zou, Zecheng Wang, Tinglong Liao, Shuhan Yuan:
Robust Unstructured Knowledge Access in Conversational Dialogue with ASR Errors. ICASSP 2022: 6702-6706 - [c26]Xiao Han, Depeng Xu
, Shuhan Yuan
, Xintao Wu
:
Few-shot Anomaly Detection and Classification Through Reinforced Data Selection. ICDM 2022: 963-968 - [c25]Che Wang, Shuhan Yuan, Kai Shao, Keith W. Ross:
On the Convergence of the Monte Carlo Exploring Starts Algorithm for Reinforcement Learning. ICLR 2022 - [c24]Kshitiz Tiwari, Shuhan Yuan
, Lu Zhang:
Robust Hate Speech Detection via Mitigating Spurious Correlations. AACL/IJCNLP (2) 2022: 51-56 - [c23]Depeng Xu
, Shuhan Yuan
, Yueyang Wang, Angela Uchechukwu Nwude, Lu Zhang
, Anna Zajicek
, Xintao Wu:
Coded Hate Speech Detection via Contextual Information. PAKDD (1) 2022: 93-105 - [i17]Shuhan Yuan, Xintao Wu:
Trustworthy Anomaly Detection: A Survey. CoRR abs/2202.07787 (2022) - [i16]He Cheng, Depeng Xu
, Shuhan Yuan, Xintao Wu:
Fine-grained Anomaly Detection in Sequential Data via Counterfactual Explanations. CoRR abs/2210.04145 (2022) - [i15]Yik-Cheung Tam, Jiacheng Xu, Jiakai Zou, Zecheng Wang, Tinglong Liao, Shuhan Yuan:
Robust Unstructured Knowledge Access in Conversational Dialogue with ASR Errors. CoRR abs/2211.03990 (2022) - [i14]Xingyi Zhao, Lu Zhang, Depeng Xu
, Shuhan Yuan:
Generating Textual Adversaries with Minimal Perturbation. CoRR abs/2211.06571 (2022) - [i13]Xiao Han, Lu Zhang, Yongkai Wu
, Shuhan Yuan:
On Interpretable Anomaly Detection Using Causal Algorithmic Recourse. CoRR abs/2212.04031 (2022) - 2021
- [j5]Shuhan Yuan
, Xintao Wu
:
Deep learning for insider threat detection: Review, challenges and opportunities. Comput. Secur. 104: 102221 (2021) - [j4]Jianting Chen, Shuhan Yuan, Dongdong Lv, Yang Xiang:
A novel self-learning feature selection approach based on feature attributions. Expert Syst. Appl. 183: 115219 (2021) - [c22]Panpan Zheng, Shuhan Yuan
, Xintao Wu
, Yubao Wu:
Hidden Buyer Identification in Darknet Markets via Dirichlet Hawkes Process. IEEE BigData 2021: 581-589 - [c21]Xiao Han
, He Cheng
, Depeng Xu
, Shuhan Yuan
:
InterpretableSAD: Interpretable Anomaly Detection in Sequential Log Data. IEEE BigData 2021: 1183-1192 - [c20]Depeng Xu
, Shuhan Yuan
, Xintao Wu
:
Achieving Differential Privacy in Vertically Partitioned Multiparty Learning. IEEE BigData 2021: 5474-5483 - [c19]Xiao Han
, Shuhan Yuan
:
Unsupervised Cross-system Log Anomaly Detection via Domain Adaptation. CIKM 2021: 3068-3072 - [c18]Haixuan Guo, Shuhan Yuan
, Xintao Wu
:
LogBERT: Log Anomaly Detection via BERT. IJCNN 2021: 1-8 - [i12]Haixuan Guo, Shuhan Yuan, Xintao Wu:
LogBERT: Log Anomaly Detection via BERT. CoRR abs/2103.04475 (2021) - 2020
- [c17]Shuhan Yuan
, Panpan Zheng, Xintao Wu
, Hanghang Tong
:
Few-shot Insider Threat Detection. CIKM 2020: 2289-2292 - [i11]Shuhan Yuan, Xintao Wu:
Deep Learning for Insider Threat Detection: Review, Challenges and Opportunities. CoRR abs/2005.12433 (2020)
2010 – 2019
- 2019
- [c16]Panpan Zheng, Shuhan Yuan
, Xintao Wu:
SAFE: A Neural Survival Analysis Model for Fraud Early Detection. AAAI 2019: 1278-1285 - [c15]Panpan Zheng, Shuhan Yuan
, Xintao Wu, Jun Li, Aidong Lu:
One-Class Adversarial Nets for Fraud Detection. AAAI 2019: 1286-1293 - [c14]Shuhan Yuan
, Panpan Zheng, Xintao Wu
, Qinghua Li:
Insider Threat Detection via Hierarchical Neural Temporal Point Processes. IEEE BigData 2019: 1343-1350 - [c13]Depeng Xu
, Shuhan Yuan, Lu Zhang, Xintao Wu
:
FairGAN+: Achieving Fair Data Generation and Classification through Generative Adversarial Nets. IEEE BigData 2019: 1401-1406 - [c12]Depeng Xu
, Yongkai Wu
, Shuhan Yuan
, Lu Zhang
, Xintao Wu
:
Achieving Causal Fairness through Generative Adversarial Networks. IJCAI 2019: 1452-1458 - [c11]Yuemeng Li, Aidong Lu, Xintao Wu
, Shuhan Yuan:
Dynamic Anomaly Detection Using Vector Autoregressive Model. PAKDD (1) 2019: 600-611 - [c10]Depeng Xu
, Shuhan Yuan
, Xintao Wu
:
Achieving Differential Privacy and Fairness in Logistic Regression. WWW (Companion Volume) 2019: 594-599 - [i10]Shuhan Yuan, Panpan Zheng, Xintao Wu, Qinghua Li:
Insider Threat Detection via Hierarchical Neural Temporal Point Processes. CoRR abs/1910.03171 (2019) - [i9]Depeng Xu, Shuhan Yuan, Xintao Wu:
Achieving Differential Privacy in Vertically Partitioned Multiparty Learning. CoRR abs/1911.04587 (2019) - [i8]Panpan Zheng, Shuhan Yuan, Xintao Wu, Yubao Wu
:
Identifying Hidden Buyers in Darknet Markets via Dirichlet Hawkes Process. CoRR abs/1911.04620 (2019) - 2018
- [j3]Shuhan Yuan, Xintao Wu
, Yang Xiang:
Task-specific word identification from short texts using a convolutional neural network. Intell. Data Anal. 22(3): 533-550 (2018) - [j2]Yuemeng Li, Shuhan Yuan, Xintao Wu
, Aidong Lu:
On spectral analysis of directed signed graphs. Int. J. Data Sci. Anal. 6(2): 147-162 (2018) - [j1]Shuhan Yuan, Xintao Wu
, Yang Xiang:
Incorporating pre-training in long short-term memory networks for tweet classification. Soc. Netw. Anal. Min. 8(1): 52:1-52:16 (2018) - [c9]Depeng Xu
, Shuhan Yuan
, Lu Zhang, Xintao Wu
:
FairGAN: Fairness-aware Generative Adversarial Networks. IEEE BigData 2018: 570-575 - [c8]Depeng Xu
, Shuhan Yuan, Xintao Wu
, NhatHai Phan:
DPNE: Differentially Private Network Embedding. PAKDD (2) 2018: 235-246 - [i7]Panpan Zheng, Shuhan Yuan, Xintao Wu, Jun Li, Aidong Lu:
One-Class Adversarial Nets for Fraud Detection. CoRR abs/1803.01798 (2018) - [i6]Depeng Xu, Shuhan Yuan, Lu Zhang, Xintao Wu:
FairGAN: Fairness-aware Generative Adversarial Networks. CoRR abs/1805.11202 (2018) - [i5]Panpan Zheng, Shuhan Yuan, Xintao Wu:
SAFE: A Neural Survival Analysis Model for Fraud Early Detection. CoRR abs/1809.04683 (2018) - 2017
- [c7]Shuhan Yuan
, Xintao Wu
, Jun Li, Aidong Lu:
Spectrum-based Deep Neural Networks for Fraud Detection. CIKM 2017: 2419-2422 - [c6]Depeng Xu
, Shuhan Yuan, Xintao Wu
:
Differential Privacy Preserving Causal Graph Discovery. PAC 2017: 60-71 - [c5]Shuhan Yuan
, Xintao Wu
, Yang Xiang:
SNE: Signed Network Embedding. PAKDD (2) 2017: 183-195 - [c4]Shuhan Yuan
, Panpan Zheng, Xintao Wu
, Yang Xiang:
Wikipedia Vandal Early Detection: From User Behavior to User Embedding. ECML/PKDD (1) 2017: 832-846 - [i4]Shuhan Yuan, Xintao Wu, Yang Xiang:
SNE: Signed Network Embedding. CoRR abs/1703.04837 (2017) - [i3]Shuhan Yuan, Xintao Wu, Yang Xiang:
Task-specific Word Identification from Short Texts Using a Convolutional Neural Network. CoRR abs/1706.00884 (2017) - [i2]Shuhan Yuan, Panpan Zheng, Xintao Wu, Yang Xiang:
Wikipedia Vandal Early Detection: from User Behavior to User Embedding. CoRR abs/1706.00887 (2017) - [i1]Shuhan Yuan, Xintao Wu, Jun Li, Aidong Lu:
Spectrum-based deep neural networks for fraud detection. CoRR abs/1706.00891 (2017) - 2016
- [c3]Shuhan Yuan, Xintao Wu
, Yang Xiang:
A Two Phase Deep Learning Model for Identifying Discrimination from Tweets. EDBT 2016: 696-697 - [c2]Shuhan Yuan, Xintao Wu, Yang Xiang:
Incorporating Pre-Training in Long Short-Term Memory Networks for Tweets Classification. ICDM 2016: 1329-1334 - 2015
- [c1]Shuhan Yuan, Yang Xiang, Maozhen Li:
A Knowledge Resources Based Neural Network for Learning Word and Relation Representations. HPCC/CSS/ICESS 2015: 1731-1736
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint