Yilin Shen
Yilin Shen
AI Research Scientist
E-mailová adresa ověřena na:
Detecting critical nodes in interdependent power networks for vulnerability assessment
Y Shen, DT Nguyen, MT Thai
IEEE Transactions on Smart Grid 4 (1), 151-159, 2013
Generalized odin: Detecting out-of-distribution image without learning from out-of-distribution data
YC Hsu, Y Shen, H Jin, Z Kira
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020
Handbook of optimization in complex networks: theory and applications
MT Thai, PM Pardalos, Y Shen
Springer, 2012
A bi-model based rnn semantic frame parsing model for intent detection and slot filling
Y Wang, Y Shen, H Jin
arXiv preprint arXiv:1812.10235, 2018
Taking a hint: Leveraging explanations to make vision and language models more grounded
RR Selvaraju, S Lee, Y Shen, H Jin, S Ghosh, L Heck, D Batra, D Parikh
Proceedings of the IEEE/CVF international conference on computer vision …, 2019
On the discovery of critical links and nodes for assessing network vulnerability
Y Shen, NP Nguyen, Y Xuan, MT Thai
IEEE/ACM Transactions on Networking 21 (3), 963-973, 2012
Dynamic social community detection and its applications
NP Nguyen, TN Dinh, Y Shen, MT Thai
PloS one 9 (4), e91431, 2014
On the approximability of positive influence dominating set in social networks
TN Dinh, Y Shen, DT Nguyen, MT Thai
Journal of Combinatorial Optimization 27 (3), 487-503, 2014
Cognitive decline, dementia, Alzheimer’s disease and presbycusis: examination of the possible molecular mechanism
Y Shen, B Ye, P Chen, Q Wang, C Fan, Y Shu, M Xiang
Frontiers in neuroscience 12, 394, 2018
Privacy-preserving personalized recommendation: An instance-based approach via differential privacy
Y Shen, H Jin
2014 IEEE International Conference on Data Mining, 540-549, 2014
Epicrec: Towards practical differentially private framework for personalized recommendation
Y Shen, H Jin
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
A trigger identification service for defending reactive jammers in WSN
Y Xuan, Y Shen, NP Nguyen, MT Thai
IEEE Transactions on Mobile Computing 11 (5), 793-806, 2011
Secure pick up: Implicit authentication when you start using the smartphone
WH Lee, X Liu, Y Shen, H Jin, RB Lee
Proceedings of the 22nd ACM on symposium on access control models and …, 2017
Interest-matching information propagation in multiple online social networks
Y Shen, TN Dinh, H Zhang, MT Thai
Proceedings of the 21st ACM international conference on Information and …, 2012
A visual dialog augmented interactive recommender system
T Yu, Y Shen, H Jin
Proceedings of the 25th ACM SIGKDD international conference on knowledge …, 2019
Reactive jamming attacks in multi-radio wireless sensor networks: an efficient mitigating measure by identifying trigger nodes
I Shin, Y Shen, Y Xuan, MT Thai, T Znati
Proceedings of the 2nd ACM international workshop on Foundations of wireless …, 2009
Adversarial Active Learning for Sequences Labeling and Generation.
Y Deng, KW Chen, Y Shen, H Jin
IJCAI, 4012-4018, 2018
Controllable information sharing for user accounts linkage across multiple online social networks
Y Shen, H Jin
Proceedings of the 23rd ACM International Conference on Conference on …, 2014
How large a vocabulary does text classification need? a variational approach to vocabulary selection
W Chen, Y Su, Y Shen, Z Chen, X Yan, W Wang
arXiv preprint arXiv:1902.10339, 2019
Text-based interactive recommendation via constraint-augmented reinforcement learning
R Zhang, T Yu, Y Shen, H Jin, C Chen
Advances in neural information processing systems 32, 2019
Systém momentálně nemůže danou operaci provést. Zkuste to znovu později.
Články 1–20