Posts by Collection
portfolio
projects
publications
User behavior similarity analysis of location based social network (in Chinese)
Published in Journal of Computer Applications, 2012
Use Google Scholar for full citation
Recommended citation: Shuhan Yuan, Weibin Chen, Shunkai Fu. "User behavior similarity analysis of location based social network (in Chinese)." Journal of Computer Applications, 2012.
Text Big Data Content Understanding and Development Based on Feature Learning (in Chinese)
Published in Big Data, 2015
Use Google Scholar for full citation
Recommended citation: Shuhan Yuan, Yang Xiang, Shijia E. "Text Big Data Content Understanding and Development Based on Feature Learning (in Chinese)." Big Data, 2015.
A Knowledge Resources Based Neural Network for Learning Word and Relation Representations
Published in In the proceedings of 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems, 2015
Use Google Scholar for full citation
Recommended citation: Shuhan Yuan, Yang Xiang, Maozhen Li. "A Knowledge Resources Based Neural Network for Learning Word and Relation Representations." In the proceedings of 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems, 2015.
A Review on Lexical Semantic Representation (in Chinese)
Published in Journal of Chinese Information Processing, 2016
Use Google Scholar for full citation
Recommended citation: Shuhan Yuan, Yang Xiang. "A Review on Lexical Semantic Representation (in Chinese)." Journal of Chinese Information Processing, 2016.
A Two Phase Deep Learning Model for Identifying Discrimination from Tweets
Published in In the Proceedings of the 19th International Conference on Extending Database Technology, EDBT 2016, 2016
Recommended citation: Shuhan Yuan, Xintao Wu, Yang Xiang. "A Two Phase Deep Learning Model for Identifying Discrimination from Tweets." In the Proceedings of the 19th International Conference on Extending Database Technology (EDBT), 2016. https://doi.org/10.5441/002/edbt.2016.92
Incorporating Pre-Training in Long Short-Term Memory Networks for Tweets Classification
Published in In the Proceedings of 2016 IEEE 16th International Conference on Data Mining (ICDM), 2016
Use Google Scholar for full citation
Recommended citation: Shuhan Yuan, Xintao Wu, Yang Xiang, "Incorporating Pre-Training in Long Short-Term Memory Networks for Tweets Classification." In the Proceedings of 2016 IEEE 16th International Conference on Data Mining (ICDM), 2016.
SNE: Signed Network Embedding
Published in In the Proceedings of Pacific-Asia Conference on Knowledge Discovery and Data Mining, 2017
Use Google Scholar for full citation
Recommended citation: Shuhan Yuan, Xintao Wu, Yang Xiang, "SNE: Signed Network Embedding." In the Proceedings of Pacific-Asia Conference on Knowledge Discovery and Data Mining, 2017.
Spectrum-based Deep Neural Networks for Fraud Detection
Published in In the Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017
Recommended citation: Shuhan Yuan, Xintao Wu, Jun Li, Aidong Lu. "Spectrum-based Deep Neural Networks for Fraud Detection." In the Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017. http://doi.acm.org/10.1145/3132847.3133139
Wikipedia Vandal Early Detection: From User Behavior to User Embedding
Published in In the Proceedings of Joint European Conference on Machine Learning and Knowledge Discovery in Databases, 2017
Use Google Scholar for full citation
Recommended citation: Shuhan Yuan, Panpan Zheng, Xintao Wu, Yang Xiang. "Wikipedia Vandal Early Detection: From User Behavior to User Embedding." In the Proceedings of Joint European Conference on Machine Learning and Knowledge Discovery in Databases, 2017.
Differential Privacy Preserving Causal Graph Discovery
Published in In the Proceedings of 2017 IEEE Symposium on Privacy-Aware Computing (PAC), 2017
Use Google Scholar for full citation
Recommended citation: Depeng Xu, Shuhan Yuan, Xintao Wu. "Differential Privacy Preserving Causal Graph Discovery." In the Proceedings of 2017 IEEE Symposium on Privacy-Aware Computing (PAC), 2017.
DPNE: Differentially Private Network Embedding
Published in In the Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), 2018
Use Google Scholar for full citation
Recommended citation: Depeng Xu, Shuhan Yuan, Xintao Wu, HaiNhat Phan. "DPNE: Differentially Private Network Embedding." In the Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), 2018.
On spectral analysis of directed signed graphs
Published in International Journal of Data Science and Analytics, 2018
Use Google Scholar for full citation
Recommended citation: Yuemeng Li, Shuhan Yuan, Xintao Wu, Aidong Lu. "On spectral analysis of directed signed graphs." International Journal of Data Science and Analytics, 2018.
Task-specific word identification from short texts using a convolutional neural network
Published in Intelligent Data Analysis, 2018
Recommended citation: Shuhan Yuan, Xintao Wu, Yang Xiang. "Task-specific word identification from short texts using a convolutional neural network." Intelligent Data Analysis, 2018. https://content.iospress.com/articles/intelligent-data-analysis/ida173413
FairGAN: Fairness-aware Generative Adversarial Networks
Published in In the Proceedings of 2018 IEEE International Conference on Big Data (Big Data), 2018
Use Google Scholar for full citation
Recommended citation: Depeng Xu, Shuhan Yuan, Lu Zhang, Xintao Wu. "FairGAN: Fairness-aware Generative Adversarial Networks." In the Proceedings of 2018 IEEE International Conference on Big Data (Big Data), 2018.
Achieving Differential Privacy and Fairness in Logistic Regression
Published in In the Proceedings of Companion Proceedings of The 2019 World Wide Web Conference, 2019
event-place: San Francisco, {USA}
Recommended citation: Depeng Xu, Shuhan Yuan, Xintao Wu. "Achieving Differential Privacy and Fairness in Logistic Regression." In the Proceedings of Companion Proceedings of The 2019 World Wide Web Conference, 2019. http://doi.acm.org/10.1145/3308560.3317584
Dynamic Anomaly Detection Using Vector Autoregressive Model
Published in In the Proceedings of 23rd Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), 2019, 2019
Recommended citation: Yuemeng Li, Aidong Lu, Xintao Wu, Shuhan Yuan. "Dynamic Anomaly Detection Using Vector Autoregressive Model." In the Proceedings of 23rd Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), 2019. https://doi.org/10.1007/978-3-030-16148-4_46
One-Class Adversarial Nets for Fraud Detection
Published in In the Proceedings of The Thirty-Third AAAI Conference on Artificial Intelligence, AAAI 2019, 2019
Recommended citation: Panpan Zheng, Shuhan Yuan, Xintao Wu, Jun Li, Aidong Lu. "One-Class Adversarial Nets for Fraud Detection." In the Proceedings of The Thirty-Third AAAI Conference on Artificial Intelligence, AAAI, 2019. https://aaai.org/ojs/index.php/AAAI/article/view/3924
SAFE: A Neural Survival Analysis Model for Fraud Early Detection
Published in In the Proceedings of The Thirty-Third AAAI Conference on Artificial Intelligence, AAAI 2019, 2019
Recommended citation: Panpan Zheng, Shuhan Yuan, Xintao Wu. "SAFE: A Neural Survival Analysis Model for Fraud Early Detection." In the Proceedings of The Thirty-Third AAAI Conference on Artificial Intelligence, AAAI, 2019. https://aaai.org/ojs/index.php/AAAI/article/view/3923
Achieving Causal Fairness through Generative Adversarial Networks
Published in In the Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, IJCAI-19, 2019
Recommended citation: Depeng Xu, Yongkai Wu, Shuhan Yuan, Lu Zhang, Xintao Wu. "Achieving Causal Fairness through Generative Adversarial Networks." In the Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, IJCAI, 2019. https://doi.org/10.24963/ijcai.2019/201
FairGAN+: Achieving Fair Data Generation and Fair Classification through Generative Adversarial Networks
Published in In the Proceedings of 2019 IEEE International Conference on Big Data (BigData), 2019
Recommended citation: Depeng Xu, Shuhan Yuan, Lu Zhang, and Xintao Wu. "FairGAN+: Achieving Fair Data Generation and Fair Classification through Generative Adversarial Networks." In the Proceedings of 2019 IEEE International Conference on Big Data (BigData), 2019. https://ieeexplore.ieee.org/document/9006322
Insider Threat Detection via Hierarchical Neural Temporal Point Processes
Published in In the Proceedings of 2019 IEEE International Conference on Big Data (BigData), 2019
Recommended citation: Shuhan Yuan, Panpan Zheng, Xintao Wu and Qinghua Li. "Insider Threat Detection via Hierarchical Neural Temporal Point Processes." In the Proceedings of 2019 IEEE International Conference on Big Data (BigData), 2019. https://arxiv.org/pdf/1910.03171.pdf
Predicting human design decisions with deep recurrent neural network combining static and dynamic data
Published in Design Science, 2020
Recommended citation: Molla Hafizur Rahman, Shuhan Yuan, Charles Xie, and Zhenghui Sha. "Predicting human design decisions with deep recurrent neural network combining static and dynamic data." Design Science 6, 2020. https://doi.org/10.1017/dsj.2020.12
Few-shot Insider Threat Detection
Published in In the Proceedings of the 29th ACM International Conference on Information and Knowledge Management, 2020
Recommended citation: Shuhan Yuan, Panpan Zheng, Xintao Wu, and Hanghang Tong. "Few-shot Insider Threat Detection." In the Proceedings of the 29th ACM International Conference on Information and Knowledge Management, 2020 https://doi.org/10.1017/dsj.2020.12
Deep learning for insider threat detection: Review, challenges and opportunities
Published in Computers & Security, 2021
Recommended citation: Shuhan Yuan and Xintao Wu. "Deep Learning for Insider Threat Detection: Review, Challenges and Opportunities". Computer & Security, 2021. https://doi.org/10.1016/j.cose.2021.102221
teaching
CS 6665: Data Mining
Spring 2020, 1:30 pm to 2:45 pm on TR in GEOL 302
CS 5665: Introduction to Data Science
Fall 2020, 1:30 pm to 2:45 pm on TR via WebBroadcast
CS 6665: Data Mining
Spring 2021, 10:30 am to 11:45 am on TR via web broadcast
CS 5665: Introduction to Data Science
Fall 2021, 1:30 pm to 2:45 pm on TR in Old Main 115 and via WebBroadcast
CS 6665: Data Mining
Spring 2022, 10:30 am to 11:45 am on TR, Huntsman Hall 160
CS 4320: Introduction to Machine Learning
Fall 2022, 1:30 pm to 2:45 pm on TR in Old Main 326
CS 5665: Introduction to Data Science
Fall 2022, 3:00 pm to 4:15 pm on TR in Old Main 326
CS 6665: Data Mining
Spring 2023, 3:00 pm to 4:15 pm on TR, Old Main 117