Follow
Minglai Shao
Title
Cited by
Cited by
Year
TIMiner: Automatically extracting and analyzing categorized cyber threat intelligence from social data
J Zhao, Q Yan, J Li, M Shao, Z He, B Li
Computers & Security 95, 101867, 2020
962020
Multi-attributed heterogeneous graph convolutional network for bot detection
J Zhao, X Liu, Q Yan, B Li, M Shao, H Peng
Information Sciences 537, 380-393, 2020
682020
An efficient approach to event detection and forecasting in dynamic multivariate social media networks
M Shao, J Li, F Chen, H Huang, S Zhang, X Chen
Proceedings of the 26th International Conference on World Wide Web, 1631-1639, 2017
492017
Text similarity computing based on LDA topic model and word co-occurrence
M Shao, L Qin
2014 2nd International Conference on Software Engineering, Knowledge …, 2014
242014
Automatically predicting cyber attack preference with attributed heterogeneous attention networks and transductive learning
J Zhao, X Liu, Q Yan, B Li, M Shao, H Peng, L Sun
computers & security 102, 102152, 2021
232021
Stacked kernel network
S Zhang, J Li, P Xie, Y Zhang, M Shao, H Zhou, M Yan
arXiv preprint arXiv:1711.09219, 2017
202017
Cyber Threat Prediction Using Dynamic Heterogeneous Graph Learning
J Zhao, M Shao, H Wang, X Yu, B Li, X Liu
Knowledge-Based Systems, 2022
172022
A novel combined dynamic ensemble selection model for imbalanced data to detect COVID-19 from complete blood count
J Wu, J Shen, M Xu, M Shao
Computer Methods and Programs in Biomedicine, 2021
162021
An efficient framework for detecting evolving anomalous subgraphs in dynamic networks
M Shao, J Li, F Chen, X Chen
IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 2258-2266, 2018
132018
Towards a Multi-view Attentive Matching for Personalized Expert Finding
Q Peng, H Liu, Y Wang, H Xu, P Jiao, M Shao, W Wang
Proceedings of the ACM Web Conference, 2022
92022
Porn2Vec: A robust framework for detecting pornographic websites based on contrastive learning
J Zhao, M Shao, H Peng, H Wang, B Li, X Liu
Knowledge-Based Systems, 2021
92021
Structured sparsity model based trajectory tracking using private location data release
M Shao, J Li, Q Yan, F Chen, H Huang, X Chen
IEEE Transactions on Dependable and Secure Computing 18 (6), 2983-2995, 2020
82020
Towards comprehensive expert finding with a hierarchical matching network
Q Peng, W Wang, H Liu, Y Wang, H Xu, M Shao
Knowledge-Based Systems 257, 109933, 2022
72022
Learning graph deep autoencoder for anomaly detection in multi-attributed networks
M Shao, Y Lin, Q Peng, J Zhao, Z Pei, Y Sun
Knowledge-Based Systems 260, 110084, 2023
42023
MASA: An efficient framework for anomaly detection in multi-attributed networks
M Shao, J Li, Y Chang, J Zhao, X Chen
Computers & Security 102, 102085, 2021
42021
Tree decomposition based anomalous connected subgraph scanning for detecting and forecasting events in attributed social media networks
M Shao, P Sun, J Li, Q Yan, Z Feng
Neurocomputing 407, 83-93, 2020
42020
Motif-level anomaly detection in dynamic graphs
Z Yuan, M Shao, Q Yan
IEEE Transactions on Information Forensics and Security, 2023
32023
Network Alignment enhanced via modeling heterogeneity of anchor nodes
Y Wang, Q Peng, W Wang, X Guo, M Shao, H Liu, W Liang, L Pan
Knowledge-Based Systems 250, 109116, 2022
32022
Heterogeneous network representation learning based on role feature extraction
Y Sun, M Jia, C Liu, M Shao
Pattern Recognition 144, 109870, 2023
22023
Pursuing counterfactual fairness via sequential autoencoder across domains
Y Lin, C Zhao, M Shao, B Meng, X Zhao, H Chen
arXiv preprint arXiv:2309.13005, 2023
22023
The system can't perform the operation now. Try again later.
Articles 1–20