A survey on metric learning for feature vectors and structured data

A Bellet, A Habrard, M Sebban - arXiv preprint arXiv:1306.6709, 2013 - arxiv.org
The need for appropriate ways to measure the distance or similarity between data is
ubiquitous in machine learning, pattern recognition and data mining, but handcrafting such …

Anomaly detection in dynamic networks: a survey

S Ranshous, S Shen, D Koutra… - Wiley …, 2015 - Wiley Online Library
Anomaly detection is an important problem with multiple applications, and thus has been
studied for decades in various research domains. In the past decade there has been a …

Graph r-cnn for scene graph generation

J Yang, J Lu, S Lee, D Batra… - Proceedings of the …, 2018 - openaccess.thecvf.com
We propose a novel scene graph generation model called Graph R-CNN, that is both
effective and efficient at detecting objects and their relations in images. Our model contains …

Graph matching networks for learning the similarity of graph structured objects

Y Li, C Gu, T Dullien, O Vinyals… - … conference on machine …, 2019 - proceedings.mlr.press
This paper addresses the challenging problem of retrieval and matching of graph structured
objects, and makes two key contributions. First, we demonstrate how Graph Neural …

Sequential recommendation via stochastic self-attention

Z Fan, Z Liu, Y Wang, A Wang, Z Nazari… - Proceedings of the …, 2022 - dl.acm.org
Sequential recommendation models the dynamics of a user's previous behaviors in order to
forecast the next item, and has drawn a lot of attention. Transformer-based approaches …

Neural architecture search with bayesian optimisation and optimal transport

K Kandasamy, W Neiswanger… - Advances in neural …, 2018 - proceedings.neurips.cc
Bayesian Optimisation (BO) refers to a class of methods for global optimisation of a function f
which is only accessible via point evaluations. It is typically used in settings where f is …

Unicorn: Runtime provenance-based detector for advanced persistent threats

X Han, T Pasquier, A Bates, J Mickens… - arXiv preprint arXiv …, 2020 - arxiv.org
Advanced Persistent Threats (APTs) are difficult to detect due to their" low-and-slow" attack
patterns and frequent use of zero-day exploits. We present UNICORN, an anomaly-based …

Graph based anomaly detection and description: a survey

L Akoglu, H Tong, D Koutra - Data mining and knowledge discovery, 2015 - Springer
Detecting anomalies in data is a vital task, with numerous high-impact applications in areas
such as security, finance, health care, and law enforcement. While numerous techniques …

AfterQC: automatic filtering, trimming, error removing and quality control for fastq data

S Chen, T Huang, Y Zhou, Y Han, M Xu, J Gu - BMC bioinformatics, 2017 - Springer
Background Some applications, especially those clinical applications requiring high
accuracy of sequencing data, usually have to face the troubles caused by unavoidable …

[HTML][HTML] Predicting the transmission trend of respiratory viruses in new regions via geospatial similarity learning

Y Zhao, M Hu, Y Jin, F Chen, X Wang, B Wang… - International Journal of …, 2023 - Elsevier
The outbreak and spread of COVID-19 remind us again of the devastating attack that human-
to-human transmitted respiratory infectious diseases (H-HRIDs) bring to global economics …