关注
Xiaolong Li
Xiaolong Li
Alibaba Group (previously)
在 alibaba-inc.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Heterogeneous graph neural networks for malicious account detection
Z Liu, C Chen, X Yang, J Zhou, X Li, L Song
Proceedings of the 27th ACM International Conference on Information and …, 2018
3552018
Geniepath: Graph neural networks with adaptive receptive paths
Z Liu, C Chen, L Li, J Zhou, X Li, L Song, Y Qi
Proceedings of the AAAI Conference on Artificial Intelligence 33, 4424-4431, 2019
3242019
Recurrent conditional random field for language understanding
K Yao, B Peng, G Zweig, D Yu, X Li, F Gao
2014 IEEE International Conference on Acoustics, Speech and Signal …, 2014
1622014
cw2vec: Learning Chinese Word Embeddings with Stroke n-gram Information
S Cao, W Lu, J Zhou, X Li
Proceedings of the 32th AAAI(the Association for the Advancement of …, 2018
1562018
An overview of Microsoft Web N-gram corpus and applications
K Wang, C Thrasher, E Viegas, X Li, BP Hsu
Proceedings of the NAACL HLT 2010 Demonstration Session, 45-48, 2010
1452010
A large scale ranker-based system for search query spelling correction
J Gao, X Li, D Micol, C Quirk, X Sun
Proceedings of the 23rd International Conference on Computational …, 2010
1442010
Cash-out User Detection based on Attributed Heterogeneous Information Network with a Hierarchical Attention Mechanism
B Hu, Z Zhang, C Shi, J Zhou, X Li, Y Qi
AAAI, 2019
1312019
Exploring web scale language models for search query processing
J Huang, J Gao, J Miao, X Li, K Wang, F Behr, CL Giles
Proceedings of the 19th international conference on World wide web, 451-460, 2010
1012010
Intelligent intent detection from social network messages
S Karnik, X Li, P Sundaram
US Patent 8,918,354, 2014
982014
Distributed Deep Forest and its Application to Automatic Detection of Cash-Out Fraud
YL Zhang, J Zhou, W Zheng, J Feng, L Li, Z Liu, M Li, Z Zhang, C Chen, ...
ACM Transactions on Intelligent Systems and Technology (TIST) 10 (5), 55, 2019
892019
Distributed deep forest and its application to automatic detection of cash-out fraud
YL Zhang, J Zhou, W Zheng, J Feng, L Li, Z Liu, M Li, Z Zhang, C Chen, ...
ACM Transactions on Intelligent Systems and Technology (TIST) 10 (5), 1-19, 2019
892019
Privacy Preserving Point-of-Interest Recommendation Using Decentralized Matrix Factorization
C Chen, Z Liu, P Zhao, J Zhou, X Li
Thirty-Second AAAI Conference on Artificial Intelligence, 2018
812018
Anomaly detection with partially observed anomalies
YL Zhang, L Li, J Zhou, X Li, ZH Zhou
Companion Proceedings of the The Web Conference 2018, 639-646, 2018
782018
Cross-domain review helpfulness prediction based on convolutional neural networks with auxiliary domain discriminators
C Chen, Y Yang, J Zhou, X Li, F Bao
Proceedings of the 2018 Conference of the North American Chapter of the …, 2018
652018
TitAnt: online real-time transaction fraud detection in Ant Financial
S Cao, XX Yang, C Chen, J Zhou, X Li, Y Qi
Proceedings of the VLDB Endowment 12 (12), 2082-2093, 2019
602019
Inferring search behaviors using partially observable Markov (POM) model
K Wang, N Gloy, X Li
Proceedings of the third ACM international conference on Web search and data …, 2010
602010
Kunpeng: Parameter server based distributed learning systems and its applications in alibaba and ant financial
J Zhou, X Li, P Zhao, C Chen, L Li, X Yang, Q Cui, J Yu, X Chen, Y Ding, ...
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge …, 2017
512017
Multi-Resolution Multi-Head Attention in Deep Speaker Embedding
Z Wang, K Yao, X Li, S Fang
ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and …, 2020
502020
Uncovering Insurance Fraud Conspiracy with Network Learning
C Liang, Z Liu, B Liu, J Zhou, X Li, S Yang, Y Qi
Proceedings of the 42nd International ACM SIGIR Conference on Research and …, 2019
472019
POSTER: A PU Learning based System for Potential Malicious URL Detection
YL Zhang, L Li, J Zhou, X Li, Y Liu, Y Zhang, ZH Zhou
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
452017
系统目前无法执行此操作,请稍后再试。
文章 1–20