STRIP: A Defence Against Trojan Attacks on Deep Neural Networks Y Gao, C Xu, D Wang, S Chen, DC Ranasinghe, S Nepal The 35th Annual Computer Security Applications Conference, 2019 | 251 | 2019 |
Uncovering collusive spammers in Chinese review websites C Xu, J Zhang, K Chang, C Long Proceedings of the 22nd ACM international conference on Information …, 2013 | 144 | 2013 |
Combating product review spam campaigns via multiple heterogeneous pairwise features C Xu, J Zhang Proceedings of the 2015 SIAM International Conference on Data Mining, 172-180, 2015 | 58 | 2015 |
PowerLSTM: power demand forecasting using long short-term memory neural network Y Cheng, C Xu, D Mashima, VLL Thing, Y Wu International Conference on Advanced Data Mining and Applications, 727-740, 2017 | 55 | 2017 |
Cross-target stance classification with self-attention networks C Xu, C Paris, S Nepal, R Sparks arXiv preprint arXiv:1805.06593, 2018 | 54 | 2018 |
Towards collusive fraud detection in online reviews C Xu, J Zhang 2015 IEEE international conference on data mining, 1051-1056, 2015 | 53 | 2015 |
Detecting collusive spammers in online review communities C Xu Proceedings of the sixth workshop on Ph. D. students in information and …, 2013 | 28 | 2013 |
Exploiting trust and distrust information to combat sybil attack in online social networks H Zhang, C Xu, J Zhang IFIP International Conference on Trust Management, 77-92, 2014 | 11 | 2014 |
Online Reputation Fraud Campaign Detection in User Ratings. C Xu, J Zhang, Z Sun IJCAI, 3873-3879, 2017 | 10 | 2017 |
Collusive opinion fraud detection in online reviews: A probabilistic modeling approach C Xu, J Zhang ACM Transactions on the Web (TWEB) 11 (4), 1-28, 2017 | 6 | 2017 |
Recognising Agreement and Disagreement between Stances with Reason Comparing Networks C Xu, C Paris, S Nepal, R Sparks Proceedings of the 57th Annual Meeting of the Association for Computational …, 2019 | 5 | 2019 |
Improving Sybil detection via graph pruning and regularization techniques H Zhang, J Zhang, C Fung, C Xu Asian Conference on Machine Learning, 189-204, 2016 | 5 | 2016 |
Putting words into the system's mouth: A targeted attack on neural machine translation using monolingual data poisoning J Wang, C Xu, F Guzmán, A El-Kishky, Y Tang, BIP Rubinstein, T Cohn arXiv preprint arXiv:2107.05243, 2021 | 4 | 2021 |
DAN: Dual-View Representation Learning for Adapting Stance Classifiers to New Domains C Xu, C Paris, S Nepal, R Sparks, C Long, Y Wang European Conference on Artificial Intelligence, 2020 | 3 | 2020 |
PowerNet: Neural Power Demand Forecasting in Smart Grid Y Cheng, C Xu, D Mashima, VLL Thing, Y Wu arXiv preprint arXiv:1904.11979, 2019 | 3 | 2019 |
A simple approach to the design of site-level extractors using domain-centric principles C Long, X Geng, C Xu, S Keerthi Proceedings of the 21st ACM international conference on Information and …, 2012 | 3 | 2012 |
Automated User Profiling in Location-Based Mobile Messaging Applications Y Cheng, C Xu, Y Yang, L Ying, P Su, D Feng 2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014 | 2 | 2014 |
A Targeted Attack on Black-Box Neural Machine Translation with Parallel Data Poisoning C Xu, J Wang, Y Tang, F Guzmán, BIP Rubinstein, T Cohn Proceedings of the Web Conference 2021, 3638-3650, 2021 | 1 | 2021 |
DeepMnemonic: Password Mnemonic Generation via Deep Attentive Encoder-Decoder Model Y Cheng, C Xu, Z Hai, Y Li IEEE Transactions on Dependable and Secure Computing, 2020 | 1 | 2020 |
Large-scale Wi-Fi hotspot classification via deep learning C Xu, K Chang, KC Chua, M Hu, Z Gao Proceedings of the 26th International Conference on World Wide Web Companion …, 2017 | 1 | 2017 |