Data poisoning attack against knowledge graph embedding H Zhang, T Zheng, J Gao, C Miao, L Su, Y Li, K Ren IJCAI 2019, 2019 | 96* | 2019 |
Practical data poisoning attack against next-item recommendation H Zhang, Y Li, B Ding, J Gao WebConf 2020, 2458-2464, 2020 | 74 | 2020 |
Data Poisoning Attack against Recommender System Using Incomplete and Perturbed Data H Zhang, C Tian, Y Li, L Su, N Yang, WX Zhao, J Gao SIGKDD 2021, 2154-2164, 2021 | 50 | 2021 |
Mdm: Molecular diffusion model for 3d molecule generation L Huang, H Zhang*, T Xu, KC Wong AAAI 2023 37 (4), 5105-5112, 2023 | 46 | 2023 |
Texttruth: an unsupervised approach to discover trustworthy information from multi-sourced text data H Zhang, Y Li, F Ma, J Gao, L Su SIGKDD 2018, 2729-2737, 2018 | 40 | 2018 |
Influence-aware truth discovery H Zhang, Q Li, F Ma, H Xiao, Y Li, J Gao, L Su CIKM 2016, 851-860, 2016 | 36 | 2016 |
A survey of trustworthy graph learning: Reliability, explainability, and privacy protection B Wu, J Li, J Yu, Y Bian, H Zhang, CH Chen, C Hou, G Fu, L Chen, T Xu, ... arXiv preprint arXiv:2205.10014, 2022 | 28 | 2022 |
Dtec: Distance transformation based early time series classification L Yao, Y Li, Y Li, H Zhang, M Huai, J Gao, A Zhang SDM 2019, 486-494, 2019 | 25 | 2019 |
Graph-based attack chain discovery in enterprise security systems LA Tang, H Zhang, Z Chen, B Zong, LI Zhichun, G Jiang, K Yoshihira US Patent 10,289,841, 2019 | 19 | 2019 |
Constructing graph models of event correlation in enterprise security systems LA Tang, H Zhang, Z Chen, B Zong, LI Zhichun, G Jiang, K Yoshihira US Patent 10,298,607, 2019 | 14 | 2019 |
Data poisoning attacks against outcome interpretations of predictive models H Zhang, J Gao, L Su SIGKDD 2021, 2165-2173, 2021 | 13 | 2021 |
AutoRepair: an automatic repairing approach over multi-source data C Ye, Q Li, H Zhang, H Wang, J Gao, J Li Knowledge and Information Systems 61, 227-257, 2019 | 13 | 2019 |
PatternFinder: Pattern discovery for truth discovery C Ye, H Wang, T Ma, J Gao, H Zhang, J Li Knowledge-Based Systems 176, 97-109, 2019 | 11 | 2019 |
A dual diffusion model enables 3D binding bioactive molecule generation and lead optimization given target pockets L Huang, T Xu, Y Yu, P Zhao, KC Wong, H Zhang bioRxiv, 2023.01. 28.526011, 2023 | 10 | 2023 |
A dual diffusion model enables 3D molecule generation and lead optimization based on target pockets L Huang, T Xu, Y Yu, P Zhao, X Chen, J Han, Z Xie, H Li, W Zhong, ... Nature Communications 15 (1), 2657, 2024 | 8 | 2024 |
Trustworthy Graph Learning: Reliability, Explainability, and Privacy Protection B Wu, Y Bian, H Zhang, J Li, J Yu, L Chen, C Chen, J Huang SIGKDD 2022, 4838-4839, 2022 | 7 | 2022 |
ImDrug: A Benchmark for Deep Imbalanced Learning in AI-aided Drug Discovery L Li, L Zeng, Z Gao, S Yuan, Y Bian, B Wu, H Zhang, C Lu, Y YU, W Liu, ... | 6 | 2022 |
LOKI: A Practical Data Poisoning Attack Framework against Next Item Recommendations H Zhang, Y Li, B Ding, J Gao IEEE Transactions on Knowledge and Data Engineering (TKDE), 2022 | 4 | 2022 |
Fair Classification Under Strict Unawareness H Wang, H Zhang, Y Wang, J Gao SDM 2021, 199-207, 2021 | 3 | 2021 |
Leveraging the power of informative users for local event detection H Zhang, F Ma, Y Li, C Zhang, T Wang, Y Wang, J Gao, L Su ASONAM 2018, 429-436, 2018 | 3 | 2018 |