Tang, Lu-An
4480  results:
Search for persons X
?
1

ProvIoT : Detecting Stealthy Attacks in IoT through Federat..:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
Mukherjee, Kunal ; Wiedemeier, Joshua ; Wang, Qi... - p. 241-268 , 2024
 
?
2

Multi-source Inductive Knowledge Graph Transfer:

, In: Machine Learning and Knowledge Discovery in Databases; Lecture Notes in Computer Science,
Hao, Junheng ; Tang, Lu-An ; Sun, Yizhou... - p. 155-171 , 2023
 
?
3

Temporal Graph Based Incident Analysis System for Internet ..:

, In: Lecture Notes in Computer Science; Machine Learning and Knowledge Discovery in Databases: Applied Data Science and Demo Track,
Yuan, Peng ; Tang, Lu-An ; Chen, Haifeng... - p. 305-309 , 2023
 
?
4

Explainable Anomaly Detection System for Categorical Sensor..:

, In: Machine Learning and Knowledge Discovery in Databases; Lecture Notes in Computer Science,
Yuan, Peng ; Tang, Lu-An ; Chen, Haifeng.. - p. 594-598 , 2023
 
?
5

Anomalous Event Sequence Detection:

Dong, Boxiang ; Chen, Zhengzhang ; Tang, Lu-An...
IEEE Intelligent Systems.  36 (2021)  3 - p. 5-13 , 2021
 
?
6

TINET : Learning Invariant Networks via Knowledge Transf..:

, In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining,
Luo, Chen ; Chen, Zhengzhang ; Tang, Lu-An... - p. 1890-1899 , 2018
 
?
7

Collaborative Alert Ranking for Anomaly Detection:

, In: Proceedings of the 27th ACM International Conference on Information and Knowledge Management,
Lin, Ying ; Chen, Zhengzhang ; Cao, Cheng... - p. 1987-1995 , 2018
 
?
8

TGNet : Learning to Rank Nodes in Temporal Graphs:

, In: Proceedings of the 27th ACM International Conference on Information and Knowledge Management,
Song, Qi ; Zong, Bo ; Wu, Yinghui... - p. 97-106 , 2018
 
?
9

Behavior-based Community Detection : Application to Host..:

, In: Proceedings of the 27th ACM International Conference on Information and Knowledge Management,
Cao, Cheng ; Chen, Zhengzhang ; Caverlee, James... - p. 1977-1985 , 2018
 
?
10

Efficient Discovery of Abnormal Event Sequences in Enterpri..:

, In: Proceedings of the 2017 ACM on Conference on Information and Knowledge Management,
Dong, Boxiang ; Chen, Zhengzhang ; Wang, Hui (Wendy)... - p. 707-715 , 2017
 
?
11

A Framework of Mining Trajectories from Untrustworthy Data ..:

Tang, Lu-An ; Yu, Xiao ; Gu, Quanquan...
ACM Transactions on Knowledge Discovery from Data (TKDD).  9 (2015)  3 - p. 1-35 , 2015
 
?
12

Trajectory Data Mining in Distributed Sensor Networks:

Qiao, Shaojie ; Jin, Huidong (Warren) ; Gao, Yunjun..
International Journal of Distributed Sensor Networks.  11 (2015)  7 - p. 913165 , 2015
 
?
13

A Framework of Mining Trajectories from Untrustworthy Data ..:

Tang, Lu-An ; Yu, Xiao ; Gu, Quanquan...
ACM Transactions on Knowledge Discovery from Data.  9 (2015)  3 - p. 1-35 , 2015
 
?
14

A framework of traveling companion discovery on trajectory ..:

Tang, Lu-An ; Zheng, Yu ; Yuan, Jing...
ACM Transactions on Intelligent Systems and Technology (TIST).  5 (2014)  1 - p. 1-34 , 2014
 
?
15

Mining lines in the sand : on trajectory discovery from ..:

, In: Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining,
Tang, Lu-An ; Yu, Xiao ; Gu, Quanquan... - p. 410-418 , 2013
 
1-15