Xibin Zhao
YOU?
Author Swipe
View article: Ancora: Accurate Intrusion Recovery for Web Applications
Ancora: Accurate Intrusion Recovery for Web Applications Open
Modern web application recovery presents a critical dilemma. Coarse-grained snapshot rollbacks cause unacceptable data loss for legitimate users. Surgically removing an attack's impact is hindered by a fundamental challenge in high-concurr…
View article: FG-CIBGC: A Unified Framework for Fine-Grained and Class-Incremental Behavior Graph Classification
FG-CIBGC: A Unified Framework for Fine-Grained and Class-Incremental Behavior Graph Classification Open
View article: Robust Heterogeneous Graph Classification for Molecular Property Prediction with Information Bottleneck
Robust Heterogeneous Graph Classification for Molecular Property Prediction with Information Bottleneck Open
Heterogeneous Graph Neural Networks (HGNNs) have achieved state-of-the-art performance in classifying molecular graphs, capitalizing on their ability to capture rich semantics. However, HGNNs for molecule property prediction exhibit signif…
View article: Graph-Based Cross-Domain Knowledge Distillation for Cross-Dataset Text-to-Image Person Retrieval
Graph-Based Cross-Domain Knowledge Distillation for Cross-Dataset Text-to-Image Person Retrieval Open
Video surveillance systems are crucial components for ensuring public safety and management in smart city. As a fundamental task in video surveillance, text-to-image person retrieval aims to retrieve the target person from an image gallery…
View article: Graph-Based Cross-Domain Knowledge Distillation for Cross-Dataset Text-to-Image Person Retrieval
Graph-Based Cross-Domain Knowledge Distillation for Cross-Dataset Text-to-Image Person Retrieval Open
Video surveillance systems are crucial components for ensuring public safety and management in smart city. As a fundamental task in video surveillance, text-to-image person retrieval aims to retrieve the target person from an image gallery…
View article: LESS: Efficient Log Storage System Based on Learned Model and Minimum Attribute Tree
LESS: Efficient Log Storage System Based on Learned Model and Minimum Attribute Tree Open
In recent years, cyber attacks have become increasingly sophisticated and persistent. Detection and investigation based on the provenance graph can effectively mitigate cyber intrusion. However, in the long time span of defenses, the sheer…
View article: Trident: Detecting SQL Injection Attacks via Abstract Syntax Tree-based Neural Network
Trident: Detecting SQL Injection Attacks via Abstract Syntax Tree-based Neural Network Open
View article: GLADformer: A Mixed Perspective for Graph-level Anomaly Detection
GLADformer: A Mixed Perspective for Graph-level Anomaly Detection Open
Graph-Level Anomaly Detection (GLAD) aims to distinguish anomalous graphs within a graph dataset. However, current methods are constrained by their receptive fields, struggling to learn global features within the graphs. Moreover, most con…
View article: DSFM: Enhancing Functional Code Clone Detection with Deep Subtree Interactions
DSFM: Enhancing Functional Code Clone Detection with Deep Subtree Interactions Open
Functional code clone detection is important for software maintenance. In recent years, deep learning techniques are introduced to improve the performance of functional code clone detectors. By representing each code snippet as a vector co…
View article: LTRDetector: Exploring Long-Term Relationship for Advanced Persistent Threats Detection
LTRDetector: Exploring Long-Term Relationship for Advanced Persistent Threats Detection Open
Advanced Persistent Threat (APT) is challenging to detect due to prolonged duration, infrequent occurrence, and adept concealment techniques. Existing approaches primarily concentrate on the observable traits of attack behaviors, neglectin…
View article: Multi-Energy Guided Image Translation with Stochastic Differential Equations for Near-Infrared Facial Expression Recognition
Multi-Energy Guided Image Translation with Stochastic Differential Equations for Near-Infrared Facial Expression Recognition Open
Illumination variation has been a long-term challenge in real-world facial expression recognition (FER). Under uncontrolled or non-visible light conditions, near-infrared (NIR) can provide a simple and alternative solution to obtain high-q…
View article: Hypergraph-Guided Disentangled Spectrum Transformer Networks for Near-Infrared Facial Expression Recognition
Hypergraph-Guided Disentangled Spectrum Transformer Networks for Near-Infrared Facial Expression Recognition Open
With the strong robusticity on illumination variations, near-infrared (NIR) can be an effective and essential complement to visible (VIS) facial expression recognition in low lighting or complete darkness conditions. However, facial expres…
View article: Revisiting Graph-Based Fraud Detection in Sight of Heterophily and Spectrum
Revisiting Graph-Based Fraud Detection in Sight of Heterophily and Spectrum Open
Graph-based fraud detection (GFD) can be regarded as a challenging semi-supervised node binary classification task. In recent years, Graph Neural Networks (GNN) have been widely applied to GFD, characterizing the anomalous possibility of a…
View article: Improved Bayesian Best-Worst Networks With Geographic Information System for Electric Vehicle Charging Station Selection
Improved Bayesian Best-Worst Networks With Geographic Information System for Electric Vehicle Charging Station Selection Open
Electric vehicle charging stations (EVCSs) are essential for solving the energy consumption and endurance anxiety problems of car owners. EVCSs also promote sustainable development in urban economies without relying on fossil fuels. This r…
View article: Revisiting Graph-Based Fraud Detection in Sight of Heterophily and Spectrum
Revisiting Graph-Based Fraud Detection in Sight of Heterophily and Spectrum Open
Graph-based fraud detection (GFD) can be regarded as a challenging semi-supervised node binary classification task. In recent years, Graph Neural Networks (GNN) have been widely applied to GFD, characterizing the anomalous possibility of a…
View article: Hypergraph-Guided Disentangled Spectrum Transformer Networks for Near-Infrared Facial Expression Recognition
Hypergraph-Guided Disentangled Spectrum Transformer Networks for Near-Infrared Facial Expression Recognition Open
With the strong robusticity on illumination variations, near-infrared (NIR) can be an effective and essential complement to visible (VIS) facial expression recognition in low lighting or complete darkness conditions. However, facial expres…
View article: Multi-Energy Guided Image Translation with Stochastic Differential Equations for Near-Infrared Facial Expression Recognition
Multi-Energy Guided Image Translation with Stochastic Differential Equations for Near-Infrared Facial Expression Recognition Open
Illumination variation has been a long-term challenge in real-world facial expression recognition(FER). Under uncontrolled or non-visible light conditions, Near-infrared (NIR) can provide a simple and alternative solution to obtain high-qu…
View article: Enhancing Single-Frame Supervision for Better Temporal Action Localization
Enhancing Single-Frame Supervision for Better Temporal Action Localization Open
Temporal action localization aims to identify the boundaries and categories of actions in videos, such as scoring a goal in a football match. Single-frame supervision has emerged as a labor-efficient way to train action localizers as it re…
View article: xASTNN: Improved Code Representations for Industrial Practice
xASTNN: Improved Code Representations for Industrial Practice Open
The application of deep learning techniques in software engineering becomes increasingly popular. One key problem is developing high-quality and easy-to-use source code representations for code-related tasks. The research community has acq…
View article: Few-shot Message-Enhanced Contrastive Learning for Graph Anomaly Detection
Few-shot Message-Enhanced Contrastive Learning for Graph Anomaly Detection Open
Graph anomaly detection plays a crucial role in identifying exceptional instances in graph data that deviate significantly from the majority. It has gained substantial attention in various domains of information security, including network…
View article: Variance-Aware Bi-Attention Expression Transformer for Open-Set Facial Expression Recognition in the Wild
Variance-Aware Bi-Attention Expression Transformer for Open-Set Facial Expression Recognition in the Wild Open
Despite the great accomplishments of facial expression recognition (FER) models in closed-set scenarios, they still lack open-world robustness when it comes to handling unknown samples. To address the demands of operating in an open enviro…
View article: Learning Deep Hierarchical Features with Spatial Regularization for One-Class Facial Expression Recognition
Learning Deep Hierarchical Features with Spatial Regularization for One-Class Facial Expression Recognition Open
Existing methods on facial expression recognition (FER) are mainly trained in the setting when multi-class data is available. However, to detect the alien expressions that are absent during training, this type of methods cannot work. To ad…
View article: Exploring Global and Local Information for Anomaly Detection with Normal Samples
Exploring Global and Local Information for Anomaly Detection with Normal Samples Open
Anomaly detection aims to detect data that do not conform to regular patterns, and such data is also called outliers. The anomalies to be detected are often tiny in proportion, containing crucial information, and are suitable for applicati…
View article: TBDetector:Transformer-Based Detector for Advanced Persistent Threats with Provenance Graph
TBDetector:Transformer-Based Detector for Advanced Persistent Threats with Provenance Graph Open
APT detection is difficult to detect due to the long-term latency, covert and slow multistage attack patterns of Advanced Persistent Threat (APT). To tackle these issues, we propose TBDetector, a transformer-based advanced persistent threa…
View article: xASTNN: Improved Code Representations for Industrial Practice
xASTNN: Improved Code Representations for Industrial Practice Open
The application of deep learning techniques in software engineering becomes increasingly popular. One key problem is developing high-quality and easy-to-use source code representations for code-related tasks. The research community has acq…
View article: Grow and Merge: A Unified Framework for Continuous Categories Discovery
Grow and Merge: A Unified Framework for Continuous Categories Discovery Open
Although a number of studies are devoted to novel category discovery, most of them assume a static setting where both labeled and unlabeled data are given at once for finding new categories. In this work, we focus on the application scenar…
View article: Exploring complex and heterogeneous correlations on hypergraph for the prediction of drug-target interactions
Exploring complex and heterogeneous correlations on hypergraph for the prediction of drug-target interactions Open
The continuous emergence of drug-target interaction data provides an opportunity to construct a biological network for systematically discovering unknown interactions. However, this is challenging due to complex and heterogeneous correlati…
View article: ICCCN 2021 Technical Program
ICCCN 2021 Technical Program Open
View article: View-Guided Point Cloud Completion
View-Guided Point Cloud Completion Open
This paper presents a view-guided solution for the task of point cloud completion. Unlike most existing methods directly inferring the missing points using shape priors, we address this task by introducing ViPC (view-guided point cloud com…
View article: Speeding up Very Fast Decision Tree with Low Computational Cost
Speeding up Very Fast Decision Tree with Low Computational Cost Open
Very Fast Decision Tree (VFDT) is one of the most widely used online decision tree induction algorithms, and it provides high classification accuracy with theoretical guarantees. In VFDT, the split-attempt operation is essential for leaf-s…