Discovering malicious domains through passive DNS data graph analysis I Khalil, T Yu, B Guan Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 120 | 2016 |
Large language models meet nl2code: A survey D Zan, B Chen, F Zhang, D Lu, B Wu, B Guan, Y Wang, JG Lou arXiv preprint arXiv:2212.09420, 2022 | 90 | 2022 |
CERT: continual pre-training on sketches for library-oriented code generation D Zan, B Chen, D Yang, Z Lin, M Kim, B Guan, Y Wang, W Chen, JG Lou arXiv preprint arXiv:2206.06888, 2022 | 71 | 2022 |
CIVSched: A Communication-aware Inter-VM Scheduling Technique for Decreased Network Latency between Co-located VMs B Guan, J Wu, Y Wang, SU Khan IEEE Transactions on Cloud Computing 2 (3), 320-332, 2014 | 48 | 2014 |
When language model meets private library D Zan, B Chen, Z Lin, B Guan, Y Wang, JG Lou arXiv preprint arXiv:2210.17236, 2022 | 36 | 2022 |
Return-Oriented Programming Attack on the Xen Hypervisor B Ding, Y Wu, Y He, S Tian, B Guan, G Wu International Conference on Availability, Reliability and Security (ARES …, 2012 | 28 | 2012 |
Predictive value of serum thyroglobulin for structural recurrence following lobectomy for papillary thyroid carcinoma S Xu, H Huang, X Zhang, Y Huang, B Guan, J Qian, X Wang, S Liu, Z Xu, ... Thyroid 31 (9), 1391-1399, 2021 | 27 | 2021 |
A domain is only as good as its buddies: Detecting stealthy malicious domains via graph inference IM Khalil, B Guan, M Nabeel, T Yu Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018 | 27 | 2018 |
Following passive DNS traces to detect stealthy malicious domains via graph inference M Nabeel, IM Khalil, B Guan, T Yu ACM Transactions on Privacy and Security (TOPS) 23 (4), 1-36, 2020 | 20 | 2020 |
Private-library-oriented code generation with large language models D Zan, B Chen, Y Gong, J Cao, F Zhang, B Wu, B Guan, Y Yin, Y Wang arXiv preprint arXiv:2307.15370, 2023 | 12 | 2023 |
When neural model meets nl2code: A survey D Zan, B Chen, F Zhang, D Lu, B Wu, B Guan, Y Wang, JG Lou arXiv preprint arXiv:2212.09420, 2022 | 12 | 2022 |
Research on satellite orbit prediction based on neural network algorithm H Ren, X Chen, B Guan, Y Wang, T Liu, K Peng Proceedings of the 2019 3rd High Performance Computing and Cluster …, 2019 | 8 | 2019 |
Killing two birds with one stone: Malicious domain detection with high accuracy and coverage I Khalil, B Guan, M Nabeel, T Yu arXiv preprint arXiv:1711.00300, 2017 | 7 | 2017 |
A Novel Security Scheme for Online Banking Based on Virtual Machine B Guan, Y Wu, Y Wang International Conference on Software Security and Reliability (SERE 2012), 12-17, 2012 | 7 | 2012 |
SQL: Retrieval Augmented Zero-Shot Question Answering over Knowledge Graph D Zan, S Wang, H Zhang, Y Yan, W Wu, B Guan, Y Wang Pacific-Asia Conference on Knowledge Discovery and Data Mining, 223-236, 2022 | 5 | 2022 |
CIVSched: Communication-aware Inter-VM Scheduling in Virtual Machine Monitor based on the Process B Guan, Y Wu, L Ding, Y Wang IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing …, 2013 | 5 | 2013 |
C2Hunter: Detection and Mitigation of Covert Channels in Data Centers J Wu, Y Wu, B Guan, Y Lin, SU Khan, N Min-Allah, Y Wang Handbook on Data Centers, 961-996, 2015 | 4 | 2015 |
Enhancing sequential recommendation via decoupled knowledge graphs B Wu, C Deng, B Guan, Y Wang, Y Kangyang European Semantic Web Conference, 3-20, 2022 | 3 | 2022 |
CodeS: Natural Language to Code Repository via Multi-Layer Sketch D Zan, A Yu, W Liu, D Chen, B Shen, W Li, Y Yao, Y Gong, X Chen, ... arXiv preprint arXiv:2403.16443, 2024 | 2 | 2024 |
We Are Not So Similar: Alleviating User Representation Collapse in Social Recommendation B Wu, Y Kang, B Guan, Y Wang Proceedings of the 2023 ACM International Conference on Multimedia Retrieval …, 2023 | 2 | 2023 |