Follow
Bei Guan
Bei Guan
Qatar Computing Research Institute (QCRI), HBKU
Verified email at qf.org.qa - Homepage
Title
Cited by
Cited by
Year
Discovering malicious domains through passive DNS data graph analysis
I Khalil, T Yu, B Guan
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
1132016
Large language models meet nl2code: A survey
D Zan, B Chen, F Zhang, D Lu, B Wu, B Guan, Y Wang, JG Lou
arXiv preprint arXiv:2212.09420, 2022
582022
CERT: continual pre-training on sketches for library-oriented code generation
D Zan, B Chen, D Yang, Z Lin, M Kim, B Guan, Y Wang, W Chen, JG Lou
arXiv preprint arXiv:2206.06888, 2022
572022
CIVSched: A Communication-aware Inter-VM Scheduling Technique for Decreased Network Latency between Co-located VMs
B Guan, J Wu, Y Wang, SU Khan
IEEE Transactions on Cloud Computing 2 (3), 320-332, 2014
482014
A domain is only as good as its buddies: Detecting stealthy malicious domains via graph inference
IM Khalil, B Guan, M Nabeel, T Yu
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
272018
Return-Oriented Programming Attack on the Xen Hypervisor
B Ding, Y Wu, Y He, S Tian, B Guan, G Wu
International Conference on Availability, Reliability and Security (ARES …, 2012
272012
When language model meets private library
D Zan, B Chen, Z Lin, B Guan, Y Wang, JG Lou
arXiv preprint arXiv:2210.17236, 2022
262022
Predictive value of serum thyroglobulin for structural recurrence following lobectomy for papillary thyroid carcinoma
S Xu, H Huang, X Zhang, Y Huang, B Guan, J Qian, X Wang, S Liu, Z Xu, ...
Thyroid 31 (9), 1391-1399, 2021
252021
Following passive DNS traces to detect stealthy malicious domains via graph inference
M Nabeel, IM Khalil, B Guan, T Yu
ACM Transactions on Privacy and Security (TOPS) 23 (4), 1-36, 2020
192020
When neural model meets nl2code: A survey
D Zan, B Chen, F Zhang, D Lu, B Wu, B Guan, Y Wang, JG Lou
arXiv preprint arXiv:2212.09420, 2022
112022
Research on satellite orbit prediction based on neural network algorithm
H Ren, X Chen, B Guan, Y Wang, T Liu, K Peng
Proceedings of the 2019 3rd High Performance Computing and Cluster …, 2019
72019
Killing two birds with one stone: Malicious domain detection with high accuracy and coverage
I Khalil, B Guan, M Nabeel, T Yu
arXiv preprint arXiv:1711.00300, 2017
72017
Private-library-oriented code generation with large language models
D Zan, B Chen, Y Gong, J Cao, F Zhang, B Wu, B Guan, Y Yin, Y Wang
arXiv preprint arXiv:2307.15370, 2023
62023
A Novel Security Scheme for Online Banking Based on Virtual Machine
B Guan, Y Wu, Y Wang
International Conference on Software Security and Reliability (SERE 2012), 12-17, 2012
62012
CIVSched: Communication-aware Inter-VM Scheduling in Virtual Machine Monitor based on the Process
B Guan, Y Wu, L Ding, Y Wang
IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing …, 2013
52013
SQL: Retrieval Augmented Zero-Shot Question Answering over Knowledge Graph
D Zan, S Wang, H Zhang, Y Yan, W Wu, B Guan, Y Wang
Pacific-Asia Conference on Knowledge Discovery and Data Mining, 223-236, 2022
42022
C2Hunter: Detection and Mitigation of Covert Channels in Data Centers
J Wu, Y Wu, B Guan, Y Lin, SU Khan, N Min-Allah, Y Wang
Handbook on Data Centers, 961-996, 2015
42015
Enhancing sequential recommendation via decoupled knowledge graphs
B Wu, C Deng, B Guan, Y Wang, Y Kangyang
European Semantic Web Conference, 3-20, 2022
22022
Hierarchical and Contrastive Representation Learning for Knowledge-Aware Recommendation
B Wu, Y Kang, D Zan, B Guan, Y Wang
2023 IEEE International Conference on Multimedia and Expo (ICME), 1050-1055, 2023
12023
We Are Not So Similar: Alleviating User Representation Collapse in Social Recommendation
B Wu, Y Kang, B Guan, Y Wang
Proceedings of the 2023 ACM International Conference on Multimedia Retrieval …, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20