Cited By
View all- Zhao JLi QHan ZFu JNan GShen MBhargava B(2025)ReTrial: Robust Encrypted Malicious Traffic Detection via Discriminative Relation Incorporation and Misleading Relation CorrectionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.351582120(677-692)Online publication date: 2025
- Yuan ZSun QZhou HShao MFu X(2025)A comprehensive survey on GNN-based anomaly detection: taxonomy, methods, and the role of large language modelsInternational Journal of Machine Learning and Cybernetics10.1007/s13042-024-02516-6Online publication date: 4-Feb-2025
- Qiu CNan GXiong TDeng WWang DTeng ZSun LCui QTao XWooldridge MDy JNatarajan S(2024)Refining latent homophilic structures over heterophilic graphs for robust graph convolution networksProceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence and Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence and Fourteenth Symposium on Educational Advances in Artificial Intelligence10.1609/aaai.v38i8.28741(8930-8938)Online publication date: 20-Feb-2024
- Show More Cited By