Discovering malicious domains through passive DNS data graph analysis I Khalil, T Yu, B Guan
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
114 2016 Large language models meet nl2code: A survey D Zan, B Chen, F Zhang, D Lu, B Wu, B Guan, Y Wang, JG Lou
arXiv preprint arXiv:2212.09420, 2022
62 2022 CERT: continual pre-training on sketches for library-oriented code generation D Zan, B Chen, D Yang, Z Lin, M Kim, B Guan, Y Wang, W Chen, JG Lou
arXiv preprint arXiv:2206.06888, 2022
58 2022 CIVSched: A Communication-aware Inter-VM Scheduling Technique for Decreased Network Latency between Co-located VMs B Guan, J Wu, Y Wang, SU Khan
IEEE Transactions on Cloud Computing 2 (3), 320-332, 2014
48 2014 A domain is only as good as its buddies: Detecting stealthy malicious domains via graph inference IM Khalil, B Guan, M Nabeel, T Yu
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
27 2018 Return-Oriented Programming Attack on the Xen Hypervisor B Ding, Y Wu, Y He, S Tian, B Guan, G Wu
International Conference on Availability, Reliability and Security (ARES …, 2012
27 2012 When language model meets private library D Zan, B Chen, Z Lin, B Guan, Y Wang, JG Lou
arXiv preprint arXiv:2210.17236, 2022
26 2022 Predictive value of serum thyroglobulin for structural recurrence following lobectomy for papillary thyroid carcinoma S Xu, H Huang, X Zhang, Y Huang, B Guan, J Qian, X Wang, S Liu, Z Xu, ...
Thyroid 31 (9), 1391-1399, 2021
25 2021 Following passive DNS traces to detect stealthy malicious domains via graph inference M Nabeel, IM Khalil, B Guan, T Yu
ACM Transactions on Privacy and Security (TOPS) 23 (4), 1-36, 2020
19 2020 When neural model meets nl2code: A survey D Zan, B Chen, F Zhang, D Lu, B Wu, B Guan, Y Wang, JG Lou
arXiv preprint arXiv:2212.09420, 2022
12 2022 Research on satellite orbit prediction based on neural network algorithm H Ren, X Chen, B Guan, Y Wang, T Liu, K Peng
Proceedings of the 2019 3rd High Performance Computing and Cluster …, 2019
7 2019 Killing two birds with one stone: Malicious domain detection with high accuracy and coverage I Khalil, B Guan, M Nabeel, T Yu
arXiv preprint arXiv:1711.00300, 2017
7 2017 Private-library-oriented code generation with large language models D Zan, B Chen, Y Gong, J Cao, F Zhang, B Wu, B Guan, Y Yin, Y Wang
arXiv preprint arXiv:2307.15370, 2023
6 2023 A Novel Security Scheme for Online Banking Based on Virtual Machine B Guan, Y Wu, Y Wang
International Conference on Software Security and Reliability (SERE 2012), 12-17, 2012
6 2012 CIVSched: Communication-aware Inter-VM Scheduling in Virtual Machine Monitor based on the Process B Guan, Y Wu, L Ding, Y Wang
IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing …, 2013
5 2013 S QL: Retrieval Augmented Zero-Shot Question Answering over Knowledge Graph D Zan, S Wang, H Zhang, Y Yan, W Wu, B Guan, Y Wang
Pacific-Asia Conference on Knowledge Discovery and Data Mining, 223-236, 2022
4 2022 C2 Hunter: Detection and Mitigation of Covert Channels in Data Centers J Wu, Y Wu, B Guan, Y Lin, SU Khan, N Min-Allah, Y Wang
Handbook on Data Centers, 961-996, 2015
4 2015 Enhancing sequential recommendation via decoupled knowledge graphs B Wu, C Deng, B Guan, Y Wang, Y Kangyang
European Semantic Web Conference, 3-20, 2022
2 2022 Hierarchical and Contrastive Representation Learning for Knowledge-Aware Recommendation B Wu, Y Kang, D Zan, B Guan, Y Wang
2023 IEEE International Conference on Multimedia and Expo (ICME), 1050-1055, 2023
1 2023 We Are Not So Similar: Alleviating User Representation Collapse in Social Recommendation B Wu, Y Kang, B Guan, Y Wang
Proceedings of the 2023 ACM International Conference on Multimedia Retrieval …, 2023
1 2023