Minglai Shao
Cited by
Cited by
TIMiner: Automatically extracting and analyzing categorized cyber threat intelligence from social data
J Zhao, Q Yan, J Li, M Shao, Z He, B Li
Computers & Security 95, 101867, 2020
Multi-attributed heterogeneous graph convolutional network for bot detection
J Zhao, X Liu, Q Yan, B Li, M Shao, H Peng
Information Sciences 537, 380-393, 2020
An efficient approach to event detection and forecasting in dynamic multivariate social media networks
M Shao, J Li, F Chen, H Huang, S Zhang, X Chen
Proceedings of the 26th International Conference on World Wide Web, 1631-1639, 2017
Automatically predicting cyber attack preference with attributed heterogeneous attention networks and transductive learning
J Zhao, X Liu, Q Yan, B Li, M Shao, H Peng, L Sun
computers & security 102, 102152, 2021
Text similarity computing based on LDA topic model and word co-occurrence
M Shao, L Qin
2014 2nd International Conference on Software Engineering, Knowledge …, 2014
Cyber Threat Prediction Using Dynamic Heterogeneous Graph Learning
J Zhao, M Shao, H Wang, X Yu, B Li, X Liu
Knowledge-Based Systems, 2022
Stacked kernel network
S Zhang, J Li, P Xie, Y Zhang, M Shao, H Zhou, M Yan
arXiv preprint arXiv:1711.09219, 2017
A novel combined dynamic ensemble selection model for imbalanced data to detect COVID-19 from complete blood count
J Wu, J Shen, M Xu, M Shao
Computer Methods and Programs in Biomedicine, 2021
An efficient framework for detecting evolving anomalous subgraphs in dynamic networks
M Shao, J Li, F Chen, X Chen
IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 2258-2266, 2018
Porn2Vec: A robust framework for detecting pornographic websites based on contrastive learning
J Zhao, M Shao, H Peng, H Wang, B Li, X Liu
Knowledge-Based Systems, 2021
Towards a Multi-view Attentive Matching for Personalized Expert Finding
Q Peng, H Liu, Y Wang, H Xu, P Jiao, M Shao, W Wang
Proceedings of the ACM Web Conference, 2022
Structured sparsity model based trajectory tracking using private location data release
M Shao, J Li, Q Yan, F Chen, H Huang, X Chen
IEEE Transactions on Dependable and Secure Computing 18 (6), 2983-2995, 2020
Learning graph deep autoencoder for anomaly detection in multi-attributed networks
M Shao, Y Lin, Q Peng, J Zhao, Z Pei, Y Sun
Knowledge-Based Systems 260, 110084, 2023
Towards comprehensive expert finding with a hierarchical matching network
Q Peng, W Wang, H Liu, Y Wang, H Xu, M Shao
Knowledge-Based Systems 257, 109933, 2022
Motif-level anomaly detection in dynamic graphs
Z Yuan, M Shao, Q Yan
IEEE Transactions on Information Forensics and Security, 2023
Multi-view change point detection in dynamic networks
Y Xie, W Wang, M Shao, T Li, Y Yu
Information Sciences 629, 344-357, 2023
MASA: An efficient framework for anomaly detection in multi-attributed networks
M Shao, J Li, Y Chang, J Zhao, X Chen
Computers & Security 102, 102085, 2021
Tree decomposition based anomalous connected subgraph scanning for detecting and forecasting events in attributed social media networks
M Shao, P Sun, J Li, Q Yan, Z Feng
Neurocomputing 407, 83-93, 2020
Heterogeneous network representation learning based on role feature extraction
Y Sun, M Jia, C Liu, M Shao
Pattern Recognition 144, 109870, 2023
Network Alignment enhanced via modeling heterogeneity of anchor nodes
Y Wang, Q Peng, W Wang, X Guo, M Shao, H Liu, W Liang, L Pan
Knowledge-Based Systems 250, 109116, 2022
The system can't perform the operation now. Try again later.
Articles 1–20