Efficient Label Contamination Attacks Against Black-Box Learning Models. M Zhao, B An, W Gao, T Zhang Proceedings of the International Joint Conference on Artificial Intelligence …, 2017 | 77 | 2017 |
Modeling scale-free graphs with hyperbolic geometry for knowledge-aware recommendation Y Chen, M Yang, Y Zhang, M Zhao, Z Meng, J Hao, I King Proceedings of the fifteenth ACM international conference on web search and …, 2022 | 68 | 2022 |
Data poisoning attacks on multi-task relationship learning M Zhao, B An, Y Yu, S Liu, S Pan Proceedings of the AAAI Conference on Artificial Intelligence 32 (1), 2628-2635, 2018 | 53 | 2018 |
Optimizing personalized email filtering thresholds to mitigate sequential spear phishing attacks M Zhao, B An, C Kiekintveld Proceedings of the AAAI Conference on Artificial Intelligence 30 (1), 2016 | 51 | 2016 |
Event-triggered communication network with limited-bandwidth constraint for multi-agent reinforcement learning G Hu, Y Zhu, D Zhao, M Zhao, J Hao IEEE Transactions on Neural Networks and Learning Systems 34 (8), 3966-3978, 2021 | 47 | 2021 |
Securing the deep fraud detector in large-scale e-commerce platform via adversarial machine learning approach Q Guo, Z Li, B An, P Hui, J Huang, L Zhang, M Zhao The world wide web conference, 616-626, 2019 | 37 | 2019 |
Impression Allocation for Combating Fraud in E-commerce Via Deep Reinforcement Learning with Action Norm Penalty. M Zhao, Z Li, B An, H Lu, Y Yang, C Chu Proceedings of the International Joint Conference on Artificial Intelligence …, 2018 | 32 | 2018 |
Vehicle traffic driven camera placement for better metropolis security surveillance Y He, X Ma, X Luo, J Li, M Zhao, B An, X Guan arXiv preprint arXiv:1705.08508, 2017 | 25 | 2017 |
Online ad hoc teamwork under partial observability P Gu, M Zhao, J Hao, B An International conference on learning representations, 2021 | 22 | 2021 |
Cmml: Contextual modulation meta learning for cold-start recommendation X Feng, C Chen, D Li, M Zhao, J Hao, J Wang Proceedings of the 30th ACM International Conference on Information …, 2021 | 20 | 2021 |
Randomized security patrolling for link flooding attack detection X Ma, B An, M Zhao, X Luo, L Xue, Z Li, TTN Miu, X Guan IEEE Transactions on Dependable and Secure Computing 17 (4), 795-812, 2019 | 18 | 2019 |
Hogrider: Champion agent of microsoft malmo collaborative ai challenge Y Xiong, H Chen, M Zhao, B An Proceedings of the AAAI Conference on Artificial Intelligence 32 (1), 4767-4774, 2018 | 18 | 2018 |
Camera placement based on vehicle traffic for better city security surveillance X Ma, Y He, X Luo, J Li, M Zhao, B An, X Guan IEEE Intelligent Systems 33 (4), 49-61, 2018 | 15 | 2018 |
Event-triggered multi-agent reinforcement learning with communication under limited-bandwidth constraint G Hu, Y Zhu, D Zhao, M Zhao, J Hao arXiv preprint arXiv:2010.04978, 2020 | 12 | 2020 |
Empirical Policy Optimization for -Player Markov Games Y Zhu, W Li, M Zhao, J Hao, D Zhao IEEE Transactions on Cybernetics, 2022 | 11 | 2022 |
The ReprGesture entry to the GENEA Challenge 2022 S Yang, Z Wu, M Li, M Zhao, J Lin, L Chen, W Bao Proceedings of the 2022 International Conference on Multimodal Interaction …, 2022 | 10 | 2022 |
Learning pseudometric-based action representations for offline reinforcement learning P Gu, M Zhao, C Chen, D Li, J Hao, B An International Conference on Machine Learning 162, 7902-7918, 2022 | 10 | 2022 |
An initial study on personalized filtering thresholds in defending sequential spear phishing attacks M Zhao, B An, C Kiekintveld Proceedings of the 2015 IJCAI Workshop on Behavioral, Economic and …, 2015 | 9 | 2015 |
Game Theoretic Analysis of Security and Sustainability. B An Proceedings of the International Joint Conference on Artificial Intelligence …, 2017 | 6 | 2017 |
A Unified Framework for Multi-Domain CTR Prediction via Large Language Models Z Fu, X Li, C Wu, Y Wang, K Dong, X Zhao, M Zhao, H Guo, R Tang arXiv preprint arXiv:2312.10743, 2023 | 5 | 2023 |