Duen Horng (Polo) Chau
Title
Cited by
Cited by
Year
Netprobe: a fast and scalable system for fraud detection in online auction networks
S Pandit, DH Chau, S Wang, C Faloutsos
Proceedings of the 16th international conference on World Wide Web, 201-210, 2007
4322007
Visual analytics in deep learning: An interrogative survey for the next frontiers
F Hohman, M Kahng, R Pienta, DH Chau
IEEE transactions on visualization and computer graphics 25 (8), 2674-2693, 2018
2152018
Polonium: Tera-Scale Graph Mining and Inference for Malware Detection
DH Chau, C Nachenberg, J Wilhelm, A Wright, C Faloutsos
SIAM International Conference on Data Mining (SDM) 2011 25, 131-142, 2011
1892011
Detecting fraudulent personalities in networks of online auctioneers
DH Chau, S Pandit, C Faloutsos
European Conference on Principles of Data Mining and Knowledge Discovery …, 2006
1892006
ActiVis: Visual Exploration of Industry-Scale Deep Neural Network Models
M Kahng, PY Andrews, A Kalro, DH Chau
IEEE transactions on visualization and computer graphics 24 (1), 88-97, 2018
1862018
A linguistic analysis of how people describe software problems
AJ Ko, BA Myers, DH Chau
Visual Languages and Human-Centric Computing (VL/HCC'06), 127-134, 2006
1832006
Apolo: making sense of large network data by combining rich user interaction and machine learning
DH Chau, A Kittur, JI Hong, C Faloutsos
Proceedings of the SIGCHI conference on human factors in computing systems …, 2011
1782011
Parallel crawling for online social networks
DH Chau, S Pandit, S Wang, C Faloutsos
Proceedings of the 16th international conference on World Wide Web, 1283-1284, 2007
1732007
On the vulnerability of large graphs
H Tong, BA Prakash, C Tsourakakis, T Eliassi-Rad, C Faloutsos, ...
2010 IEEE International Conference on Data Mining, 1091-1096, 2010
1412010
Guilt by association: large scale malware detection by mining file-relation graphs
A Tamersoy, K Roundy, DH Chau
Proceedings of the 20th ACM SIGKDD international conference on Knowledge …, 2014
1292014
Keeping the bad guys out: Protecting and vaccinating deep learning with jpeg compression
N Das, M Shanbhogue, ST Chen, F Hohman, L Chen, ME Kounavis, ...
arXiv preprint arXiv:1705.02900, 2017
1272017
Detecting insider threats in a real corporate database of computer usage activity
TE Senator, HG Goldberg, A Memory, WT Young, B Rees, R Pierce, ...
Proceedings of the 19th ACM SIGKDD international conference on Knowledge …, 2013
1162013
Unifying guilt-by-association approaches: Theorems and fast algorithms
D Koutra, TY Ke, U Kang, DHP Chau, HKK Pao, C Faloutsos
Joint European Conference on Machine Learning and Knowledge Discovery in …, 2011
1122011
Shapeshifter: Robust physical adversarial attack on faster r-cnn object detector
ST Chen, C Cornelius, J Martin, DHP Chau
Joint European Conference on Machine Learning and Knowledge Discovery in …, 2018
109*2018
Answering why and why not questions in user interfaces
BA Myers, DA Weitzman, AJ Ko, DH Chau
Proceedings of the SIGCHI conference on Human Factors in computing systems …, 2006
952006
What to do when search fails: finding information by association
DH Chau, B Myers, A Faulring
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008
882008
Huddle: automatically generating interfaces for systems of multiple connected appliances
J Nichols, B Rothrock, DH Chau, BA Myers
Proceedings of the 19th annual ACM symposium on User interface software and …, 2006
802006
Inferring file and website reputations by belief propagation leveraging machine reputation
DH Chau, A Wright
US Patent 8,341,745, 2012
762012
Shield: Fast, practical defense and vaccination for deep learning using jpeg compression
N Das, M Shanbhogue, ST Chen, F Hohman, S Li, L Chen, ME Kounavis, ...
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge …, 2018
752018
Mining large graphs: Algorithms, inference, and discoveries
U Kang, DH Chau, C Faloutsos
2011 IEEE 27th International Conference on Data Engineering, 243-254, 2011
752011
The system can't perform the operation now. Try again later.
Articles 1–20