Deep learning for anomaly detection: A review

G Pang, C Shen, L Cao, AVD Hengel - ACM computing surveys (CSUR), 2021 - dl.acm.org
Anomaly detection, aka outlier detection or novelty detection, has been a lasting yet active
research area in various research communities for several decades. There are still some …

Survey on categorical data for neural networks

JT Hancock, TM Khoshgoftaar - Journal of big data, 2020 - Springer
This survey investigates current techniques for representing qualitative data for use as input
to neural networks. Techniques for using qualitative data in neural networks are well known …

[PDF][PDF] Outlier detection for time series with recurrent autoencoder ensembles.

T Kieu, B Yang, C Guo, CS Jensen - IJCAI, 2019 - homes.cs.aau.dk
We propose two solutions to outlier detection in time series based on recurrent autoencoder
ensembles. The solutions exploit autoencoders built using sparsely-connected recurrent …

Who are the phishers? phishing scam detection on ethereum via network embedding

J Wu, Q Yuan, D Lin, W You, W Chen… - … on Systems, Man …, 2020 - ieeexplore.ieee.org
Recently, blockchain technology has become a topic in the spotlight but also a hotbed of
various cybercrimes. Among them, phishing scams on blockchain have been found to make …

[PDF][PDF] You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.

Q Wang, WU Hassan, D Li, K Jee, X Yu, K Zou, J Rhee… - NDSS, 2020 - cs.virginia.edu
To subvert recent advances in perimeter and host security, the attacker community has
developed and employed various attack vectors to make a malware much stealthier than …

Shadewatcher: Recommendation-guided cyber threat analysis using system audit records

J Zengy, X Wang, J Liu, Y Chen, Z Liang… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
System auditing provides a low-level view into cyber threats by monitoring system entity
interactions. In response to advanced cyber-attacks, one prevalent solution is to apply data …

Nodoze: Combatting threat alert fatigue with automated provenance triage

WU Hassan, S Guo, D Li, Z Chen, K Jee, Z Li… - network and distributed …, 2019 - par.nsf.gov
Large enterprises are increasingly relying on threat detection softwares (eg, Intrusion
Detection Systems) to allow them to spot suspicious activities. These softwares generate …

Task-guided and path-augmented heterogeneous network embedding for author identification

T Chen, Y Sun - Proceedings of the tenth ACM international conference …, 2017 - dl.acm.org
In this paper, we study the problem of author identification under double-blind review setting,
which is to identify potential authors given information of an anonymized paper. Different …

On sampling strategies for neural network-based collaborative filtering

T Chen, Y Sun, Y Shi, L Hong - Proceedings of the 23rd ACM SIGKDD …, 2017 - dl.acm.org
Recent advances in neural networks have inspired people to design hybrid
recommendation algorithms that can incorporate both (1) user-item interaction information …

[PDF][PDF] Heterogeneous network representation learning.

Y Dong, Z Hu, K Wang, Y Sun, J Tang - IJCAI, 2020 - cs.ucla.edu
Abstract Representation learning has offered a revolutionary learning paradigm for various
AI domains. In this survey, we examine and review the problem of representation learning …