Hengtong Zhang
Hengtong Zhang
Verified email at purdue.edu - Homepage
Title
Cited by
Cited by
Year
Texttruth: an unsupervised approach to discover trustworthy information from multi-sourced text data
H Zhang, Y Li, F Ma, J Gao, L Su
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge …, 2018
252018
Influence-aware truth discovery
H Zhang, Q Li, F Ma, H Xiao, Y Li, J Gao, L Su
Proceedings of the 25th ACM International on Conference on Information and …, 2016
212016
Data poisoning attack against knowledge graph embedding
H Zhang, T Zheng, J Gao, C Miao, L Su, Y Li, K Ren
arXiv preprint arXiv:1904.12052, 2019
152019
Dtec: Distance transformation based early time series classification
L Yao, Y Li, Y Li, H Zhang, M Huai, J Gao, A Zhang
Proceedings of the 2019 SIAM International Conference on Data Mining, 486-494, 2019
102019
Autorepair: an automatic repairing approach over multi-source data
C Ye, Q Li, H Zhang, H Wang, J Gao, J Li
Knowledge and Information Systems 61 (1), 227-257, 2019
52019
Graph-based attack chain discovery in enterprise security systems
LA Tang, H Zhang, Z Chen, B Zong, LI Zhichun, G Jiang, K Yoshihira
US Patent 10,289,841, 2019
42019
Practical Data Poisoning Attack against Next-Item Recommendation
H Zhang, Y Li, B Ding, J Gao
Proceedings of The Web Conference 2020, 2458-2464, 2020
32020
Constructing graph models of event correlation in enterprise security systems
LA Tang, H Zhang, Z Chen, B Zong, LI Zhichun, G Jiang, K Yoshihira
US Patent 10,298,607, 2019
32019
PatternFinder: Pattern discovery for truth discovery
C Ye, H Wang, T Ma, J Gao, H Zhang, J Li
Knowledge-Based Systems 176, 97-109, 2019
22019
Leveraging the power of informative users for local event detection
H Zhang, F Ma, Y Li, C Zhang, T Wang, Y Wang, J Gao, L Su
2018 IEEE/ACM International Conference on Advances in Social Networks …, 2018
22018
Veracity and Vulnerabilities Analysis of Multi-Sourced Data
H Zhang
PQDT-Global, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–11