Insider threat detection with deep neural network F Yuan, Y Cao, Y Shang, Y Liu, J Tan, B Fang International Conference on Computational Science, 43-54, 2018 | 149 | 2018 |
Hin: Hierarchical inference network for document-level relation extraction H Tang, Y Cao, Z Zhang, J Cao, F Fang, S Wang, P Yin Pacific-Asia Conference on Knowledge Discovery and Data Mining, 197-209, 2020 | 125 | 2020 |
Personalized influence maximization on social networks J Guo, P Zhang, C Zhou, Y Cao, L Guo Proceedings of the 22nd ACM international conference on Information …, 2013 | 125 | 2013 |
Joint entity linking with deep reinforcement learning Z Fang, Y Cao, Q Li, D Zhang, Z Zhang, Y Liu The world wide web conference, 438-447, 2019 | 103 | 2019 |
Combining heterogenous social and geographical information for event recommendation Z Qiao, P Zhang, Y Cao, C Zhou, L Guo, B Fang Proceedings of the AAAI Conference on Artificial Intelligence 28 (1), 2014 | 95 | 2014 |
Event recommendation in event-based social networks Z Qiao, P Zhang, C Zhou, Y Cao, L Guo, Y Zhang Proceedings of the AAAI Conference on Artificial Intelligence 28 (1), 2014 | 84 | 2014 |
Neural extractive summarization with hierarchical attentive heterogeneous graph network R Jia, Y Cao, H Tang, F Fang, C Cao, S Wang Proceedings of the 2020 Conference on Empirical Methods in Natural Language …, 2020 | 80 | 2020 |
Graph geometry interaction learning S Zhu, S Pan, C Zhou, J Wu, Y Cao, B Wang Advances in Neural Information Processing Systems 33, 7548-7558, 2020 | 78 | 2020 |
Task-adaptive neural process for user cold-start recommendation X Lin, J Wu, C Zhou, S Pan, Y Cao, B Wang Proceedings of the Web Conference 2021, 1306-1316, 2021 | 68 | 2021 |
Estimating the locations of emergency events from Twitter streams J Ao, P Zhang, Y Cao Procedia Computer Science 31, 731-739, 2014 | 67 | 2014 |
A survey of commonsense knowledge acquisition LJ Zang, C Cao, YN Cao, YM Wu, CG Cao Journal of Computer Science and Technology 28 (4), 689-719, 2013 | 60 | 2013 |
H2-FDetector: A GNN-based Fraud Detector with Homophilic and Heterophilic Connections F Shi, Y Cao, Y Shang, Y Zhou, C Zhou, J Wu Proceedings of the ACM Web Conference 2022, 1486-1494, 2022 | 51 | 2022 |
Type-aware anchor link prediction across heterogeneous networks based on graph attention network X Li, Y Shang, Y Cao, Y Li, J Tan, Y Liu Proceedings of the AAAI Conference on Artificial Intelligence 34 (01), 147-155, 2020 | 51 | 2020 |
On the frequency distribution of retweets Y Lu, P Zhang, Y Cao, Y Hu, L Guo Procedia Computer Science 31, 747-753, 2014 | 46 | 2014 |
How Does Knowledge Graph Embedding Extrapolate to Unseen Data: a Semantic Evidence View R Li, Y Cao, Q Zhu, G Bi, F Fang, Y Liu, Q Li arXiv preprint arXiv:2109.11800, 2021 | 37 | 2021 |
Parallel auto-encoder for efficient outlier detection Y Ma, P Zhang, Y Cao, L Guo 2013 IEEE International Conference on Big Data, 15-17, 2013 | 35 | 2013 |
High quality candidate generation and sequential graph attention network for entity linking Z Fang, Y Cao, R Li, Z Zhang, Y Liu, S Wang Proceedings of The Web Conference 2020, 640-650, 2020 | 34 | 2020 |
Minimizing the negative influence by blocking links in social networks Q Yao, C Zhou, L Xiang, Y Cao, L Guo International conference on trustworthy computing and services, 65-73, 2014 | 34 | 2014 |
RLINK: Deep reinforcement learning for user identity linkage X Li, Y Cao, Q Li, Y Shang, Y Li, Y Liu, G Xu World Wide Web 24 (1), 85-103, 2021 | 26 | 2021 |
Data augmentation for insider threat detection with GAN F Yuan, Y Shang, Y Liu, Y Cao, J Tan 2020 IEEE 32nd International Conference on Tools with Artificial …, 2020 | 24 | 2020 |