default search action
Xiao Yu 0007
Person information
- affiliation: University of Illinois at Urbana-Champaign, Urbana, IL, USA
Other persons with the same name
- Xiao Yu — disambiguation page
- Xiao Yu 0001 — Georgia Institute of Technology, Atlanta, GA, USA
- Xiao Yu 0002 — Xiamen University, Department of Automation, China (and 1 more)
- Xiao Yu 0003 — Chongqing University, School of Electrical Engineering, Chongqing, China
- Xiao Yu 0004 — China University of Mining and Technology, School of Information and Control Engineering, Xuzhou, China
- Xiao Yu 0005 — Shandong University of Technology, School of Computer Science and Technology, Shandong Zibo, China
- Xiao Yu 0006 — Shandong University, School of Medicine, Jinan, Shandong, China
- Xiao Yu 0008 — Wuhan University of Technology, School of Computer Science and Artificial Intelligence, Wuhan, China
- Xiao Yu 0009 — Tianjin University of Technology, School of Electrical Engineering and Automation, China (and 1 more)
- Xiao Yu 0010 — Shandong University of Finance and Economics, School of Computer Science, Jinan, China (and 1 more)
- Xiao Yu 0011 — Columbia University, Department of Computer Science, NY, USA
- Xiao Yu 0012 — Air Force Medical University, Department of Medical Electronics, School of Biomedical Engineering, Xi'an, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c32]Yufei Li, Xiao Yu, Yanghong Guo, Yanchi Liu, Haifeng Chen, Cong Liu:
Distantly-Supervised Joint Extraction with Noise-Robust Learning. ACL (Findings) 2024: 10202-10217 - [c31]Kunal Mukherjee, Joshua Wiedemeier, Qi Wang, Junpei Kamimura, Junghwan John Rhee, James Wei, Zhichun Li, Xiao Yu, Lu-An Tang, Jiaping Gui, Kangkook Jee:
ProvIoT : Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security. ACNS (3) 2024: 241-268 - 2023
- [c30]Yufei Li, Xiao Yu, Yanchi Liu, Haifeng Chen, Cong Liu:
Uncertainty-Aware Bootstrap Learning for Joint Extraction on Distantly-Supervised Data. ACL (2) 2023: 1349-1358 - [i5]Yufei Li, Xiao Yu, Yanchi Liu, Haifeng Chen, Cong Liu:
Uncertainty-Aware Bootstrap Learning for Joint Extraction on Distantly-Supervised Data. CoRR abs/2305.03827 (2023) - [i4]Yufei Li, Xiao Yu, Yanghong Guo, Yanchi Liu, Haifeng Chen, Cong Liu:
Distantly-Supervised Joint Entity and Relation Extraction with Noise-Robust Learning. CoRR abs/2310.04994 (2023) - 2021
- [c29]Xueyuan Han, Xiao Yu, Thomas F. J.-M. Pasquier, Ding Li, Junghwan Rhee, James W. Mickens, Margo I. Seltzer, Haifeng Chen:
SIGL: Securing Software Installations Through Deep Graph Learning. USENIX Security Symposium 2021: 2345-2362 - [c28]Peng Fei, Zhou Li, Zhiying Wang, Xiao Yu, Ding Li, Kangkook Jee:
SEAL: Storage-efficient Causality Analysis on Enterprise Logs with Query-friendly Compression. USENIX Security Symposium 2021: 2987-3004 - 2020
- [c27]Wajih Ul Hassan, Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Dawei Wang, Zhengzhang Chen, Zhichun Li, Junghwan Rhee, Jiaping Gui, Adam Bates:
This is Why We Can't Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage. ACSAC 2020: 165-178 - [c26]Kyungtae Kim, Chung Hwan Kim, Junghwan John Rhee, Xiao Yu, Haifeng Chen, Dave (Jing) Tian, Byoungyoung Lee:
Vessels: efficient and scalable deep learning prediction on trusted processors. SoCC 2020: 462-476 - [c25]Qi Wang, Wajih Ul Hassan, Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Junghwan Rhee, Zhengzhang Chen, Wei Cheng, Carl A. Gunter, Haifeng Chen:
You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis. NDSS 2020 - [c24]Jiaping Gui, Zhengzhang Chen, Xiao Yu, Cristian Lumezanu, Haifeng Chen:
Anomaly Detection on Web-User Behaviors Through Deep Learning. SecureComm (1) 2020: 467-473 - [i3]Xueyuan Han, Xiao Yu, Thomas F. J.-M. Pasquier, Ding Li, Junghwan Rhee, James Mickens, Margo I. Seltzer, Haifeng Chen:
SIGL: Securing Software Installations Through Deep Graph Learning. CoRR abs/2008.11533 (2020)
2010 – 2019
- 2019
- [c23]Lidan Wang, Xiao Yu, Fangbo Tao:
A Community-Enhanced Retrieval Model for Text-Rich Heterogeneous Information Networks. ICDM Workshops 2019: 505-513 - [c22]Shen Wang, Zhengzhang Chen, Xiao Yu, Ding Li, Jingchao Ni, Lu-An Tang, Jiaping Gui, Zhichun Li, Haifeng Chen, Philip S. Yu:
Heterogeneous Graph Matching Networks for Unknown Malware Detection. IJCAI 2019: 3762-3770 - [i2]Shen Wang, Zhengzhang Chen, Jingchao Ni, Xiao Yu, Zhichun Li, Haifeng Chen, Philip S. Yu:
Adversarial Defense Framework for Graph Neural Network. CoRR abs/1905.03679 (2019) - [i1]Shen Wang, Zhengzhang Chen, Xiao Yu, Ding Li, Jingchao Ni, Lu-An Tang, Jiaping Gui, Zhichun Li, Haifeng Chen, Philip S. Yu:
Heterogeneous Graph Matching Networks. CoRR abs/1910.08074 (2019) - 2015
- [j4]Lu-An Tang, Xiao Yu, Quanquan Gu, Jiawei Han, Guofei Jiang, Alice Leung, Thomas La Porta:
A Framework of Mining Trajectories from Untrustworthy Data in Cyber-Physical System. ACM Trans. Knowl. Discov. Data 9(3): 16:1-16:35 (2015) - [c21]Chang Wan, Xiang Li, Ben Kao, Xiao Yu, Quanquan Gu, David Wai-Lok Cheung, Jiawei Han:
Classification with Active Learning and Meta-Paths in Heterogeneous Information Networks. CIKM 2015: 443-452 - 2014
- [b1]Xiao Yu:
Entity recommendation and search in heterogeneous information networks. University of Illinois Urbana-Champaign, USA, 2014 - [c20]Xiang Ren, Jialu Liu, Xiao Yu, Urvashi Khandelwal, Quanquan Gu, Lidan Wang, Jiawei Han:
ClusCite: effective citation recommendation by information network-based clustering. KDD 2014: 821-830 - [c19]Xiang Ren, Yujing Wang, Xiao Yu, Jun Yan, Zheng Chen, Jiawei Han:
Heterogeneous graph-based intent learning with queries, web pages and Wikipedia concepts. WSDM 2014: 23-32 - [c18]Xiao Yu, Hao Ma, Bo-June Paul Hsu, Jiawei Han:
On building entity recommender systems using user click log and freebase knowledge. WSDM 2014: 263-272 - [c17]Xiao Yu, Xiang Ren, Yizhou Sun, Quanquan Gu, Bradley Sturt, Urvashi Khandelwal, Brandon Norick, Jiawei Han:
Personalized entity recommendation: a heterogeneous information network approach. WSDM 2014: 283-292 - 2013
- [j3]Lu-An Tang, Xiao Yu, Sangkyum Kim, Quanquan Gu, Jiawei Han, Alice Leung, Thomas La Porta:
Trustworthiness analysis of sensor data in cyber-physical systems. J. Comput. Syst. Sci. 79(3): 383-401 (2013) - [j2]Yizhou Sun, Brandon Norick, Jiawei Han, Xifeng Yan, Philip S. Yu, Xiao Yu:
PathSelClus: Integrating Meta-Path Selection with User-Guided Object Clustering in Heterogeneous Information Networks. ACM Trans. Knowl. Discov. Data 7(3): 11:1-11:23 (2013) - [c16]Chi Wang, Xiao Yu, Yanen Li, Chengxiang Zhai, Jiawei Han:
Content coverage maximization on word networks for hierarchical topic summarization. CIKM 2013: 249-258 - [c15]Lu-An Tang, Xiao Yu, Quanquan Gu, Jiawei Han, Alice Leung, Thomas La Porta:
Mining lines in the sand: on trajectory discovery from untrustworthy data in cyber-physical system. KDD 2013: 410-418 - [c14]Xiao Yu, Xiang Ren, Yizhou Sun, Bradley Sturt, Urvashi Khandelwal, Quanquan Gu, Brandon Norick, Jiawei Han:
Recommendation in heterogeneous information networks with implicit user feedback. RecSys 2013: 347-350 - [c13]Fangbo Tao, Xiao Yu, Kin Hou Lei, George Brova, Xiao Cheng, Jiawei Han, Rucha Kanade, Yizhou Sun, Chi Wang, Lidan Wang, Tim Weninger:
Research-insight: providing insight on research by publication network analysis. SIGMOD Conference 2013: 1093-1096 - 2012
- [j1]Lu-An Tang, Xiao Yu, Sangkyum Kim, Jiawei Han, Wen-Chih Peng, Yizhou Sun, Alice Leung, Thomas La Porta:
Multidimensional Sensor Data Analysis in Cyber-Physical System: An Atypical Cube Approach. Int. J. Distributed Sens. Networks 8 (2012) - [c12]Xiao Yu, Yizhou Sun, Brandon Norick, Tiancheng Mao, Jiawei Han:
User guided entity similarity search using meta-path selection in heterogeneous information networks. CIKM 2012: 2025-2029 - [c11]Lu-An Tang, Xiao Yu, Sangkyum Kim, Jiawei Han, Wen-Chih Peng, Yizhou Sun, Hector Gonzalez, Sebastian Seith:
Multidimensional Analysis of Atypical Events in Cyber-Physical Data. ICDE 2012: 1025-1036 - [c10]Yizhou Sun, Brandon Norick, Jiawei Han, Xifeng Yan, Philip S. Yu, Xiao Yu:
Integrating meta-path selection with user-guided object clustering in heterogeneous information networks. KDD 2012: 1348-1356 - [c9]Xiao Yu, Yizhou Sun, Peixiang Zhao, Jiawei Han:
Query-driven discovery of semantically similar substructures in heterogeneous networks. KDD 2012: 1500-1503 - [c8]Lu-An Tang, Quanquan Gu, Xiao Yu, Jiawei Han, Thomas La Porta, Alice Leung, Tarek F. Abdelzaher, Lance M. Kaplan:
IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems. SDM 2012: 600-611 - [c7]Xiao Yu, Quanquan Gu, Mianwei Zhou, Jiawei Han:
Citation Prediction in Heterogeneous Bibliographic Networks. SDM 2012: 1119-1130 - 2011
- [c6]Xiao Yu, Ang Pan, Lu-An Tang, Zhenhui Li, Jiawei Han:
Geo-Friends Recommendation in GPS-based Cyber-physical Social Network. ASONAM 2011: 361-368 - [c5]Xin Jin, Chi Wang, Jiebo Luo, Xiao Yu, Jiawei Han:
LikeMiner: a system for mining the power of 'like' in social media networks. KDD 2011: 753-756 - [c4]Tim Weninger, Marina Danilevsky, Fabio Fumarola, Joshua M. Hailpern, Jiawei Han, Thomas J. Johnston, Surya Kallumadi, Hyungsul Kim, Zhijin Li, David McCloskey, Yizhou Sun, Nathan E. TeGrotenhuis, Chi Wang, Xiao Yu:
WINACS: construction and analysis of web-based computer science information networks. SIGMOD Conference 2011: 1255-1258 - [c3]Lu-An Tang, Yu Zheng, Xing Xie, Jing Yuan, Xiao Yu, Jiawei Han:
Retrieving k-Nearest Neighboring Trajectories by a Set of Point Locations. SSTD 2011: 223-241 - 2010
- [c2]Lu-An Tang, Xiao Yu, Sangkyum Kim, Jiawei Han, Chih-Chieh Hung, Wen-Chih Peng:
Tru-Alarm: Trustworthiness Analysis of Sensor Networks in Cyber-Physical Systems. ICDM 2010: 1079-1084
2000 – 2009
- 2009
- [c1]Xiao Yu, Lu An Tang, Jiawei Han:
Filtering and Refinement: A Two-Stage Approach for Efficient and Effective Anomaly Detection. ICDM 2009: 617-626
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-15 01:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint