Deep learning models have recently become popular for detecting maliciou...
Ensuring fairness in anomaly detection models has received much attentio...
As many deep anomaly detection models have been deployed in the real-wor...
Many word-level adversarial attack approaches for textual data have been...
Performance of spoken language understanding (SLU) can be degraded with
...
Anomaly detection in sequential data has been studied for a long time be...
Anomaly detection has a wide range of real-world applications, such as b...
Detecting anomalous events in online computer systems is crucial to prot...
Insider threats, as one type of the most challenging threats in cyberspa...
The darknet markets are notorious black markets in cyberspace, which inv...
Preserving differential privacy has been well studied under centralized
...
Insiders usually cause significant losses to organizations and are hard ...
Many online platforms have deployed anti-fraud systems to detect and pre...
Fairness-aware learning is increasingly important in data mining.
Discri...
Many online applications, such as online social networks or knowledge ba...
Wikipedia is the largest online encyclopedia that allows anyone to edit
...
Task-specific word identification aims to choose the task-related words ...