default search action
Hengtong Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c15]Tianci Liu, Haoyu Wang, Feijie Wu, Hengtong Zhang, Pan Li, Lu Su, Jing Gao:
Towards Poisoning Fair Representations. ICLR 2024 - 2023
- [j3]Hengtong Zhang, Yaliang Li, Bolin Ding, Jing Gao:
LOKI: A Practical Data Poisoning Attack Framework Against Next Item Recommendations. IEEE Trans. Knowl. Data Eng. 35(5): 5047-5059 (2023) - [c14]Lei Huang, Hengtong Zhang, Tingyang Xu, Ka-Chun Wong:
MDM: Molecular Diffusion Model for 3D Molecule Generation. AAAI 2023: 5105-5112 - [c13]Kangfei Zhao, Yu Rong, Biaobin Jiang, Jianheng Tang, Hengtong Zhang, Jeffrey Xu Yu, Peilin Zhao:
Geometric Graph Learning for Protein Mutation Effect Prediction. CIKM 2023: 3412-3422 - [i7]Hengtong Zhang, Tingyang Xu:
Towards Controllable Diffusion Models via Reward-Guided Exploration. CoRR abs/2304.07132 (2023) - [i6]Tianci Liu, Haoyu Wang, Feijie Wu, Hengtong Zhang, Pan Li, Lu Su, Jing Gao:
Towards Poisoning Fair Representations. CoRR abs/2309.16487 (2023) - 2022
- [c12]Bingzhe Wu, Yatao Bian, Hengtong Zhang, Jintang Li, Junchi Yu, Liang Chen, Chaochao Chen, Junzhou Huang:
Trustworthy Graph Learning: Reliability, Explainability, and Privacy Protection. KDD 2022: 4838-4839 - [i5]Bingzhe Wu, Jintang Li, Junchi Yu, Yatao Bian, Hengtong Zhang, Chaochao Chen, Chengbin Hou, Guoji Fu, Liang Chen, Tingyang Xu, Yu Rong, Xiaolin Zheng, Junzhou Huang, Ran He, Baoyuan Wu, Guangyu Sun, Peng Cui, Zibin Zheng, Zhe Liu, Peilin Zhao:
A Survey of Trustworthy Graph Learning: Reliability, Explainability, and Privacy Protection. CoRR abs/2205.10014 (2022) - [i4]Lei Huang, Hengtong Zhang, Tingyang Xu, Ka-Chun Wong:
MDM: Molecular Diffusion Model for 3D Molecule Generation. CoRR abs/2209.05710 (2022) - [i3]Lanqing Li, Liang Zeng, Ziqi Gao, Shen Yuan, Yatao Bian, Bingzhe Wu, Hengtong Zhang, Chan Lu, Yang Yu, Wei Liu, Hongteng Xu, Jia Li, Peilin Zhao, Pheng-Ann Heng:
ImDrug: A Benchmark for Deep Imbalanced Learning in AI-aided Drug Discovery. CoRR abs/2209.07921 (2022) - 2021
- [c11]Hengtong Zhang, Tianhang Zheng, Yaliang Li, Jing Gao, Lu Su, Bo Li:
Profanity-Avoiding Training Framework for Seq2seq Models with Certified Robustness. EMNLP (1) 2021: 5151-5161 - [c10]Hengtong Zhang, Changxin Tian, Yaliang Li, Lu Su, Nan Yang, Wayne Xin Zhao, Jing Gao:
Data Poisoning Attack against Recommender System Using Incomplete and Perturbed Data. KDD 2021: 2154-2164 - [c9]Hengtong Zhang, Jing Gao, Lu Su:
Data Poisoning Attacks Against Outcome Interpretations of Predictive Models. KDD 2021: 2165-2173 - [c8]Xiaoxuan Hu, Hengtong Zhang, Wayne Xin Zhao, Yaliang Li, Jing Gao, Ji-Rong Wen:
RAST: A Reward Augmented Model for Fine-Grained Sentiment Transfer. NLPCC (1) 2021: 196-209 - [c7]Haoyu Wang, Hengtong Zhang, Yaqing Wang, Jing Gao:
Fair Classification Under Strict Unawareness. SDM 2021: 199-207 - 2020
- [c6]Hengtong Zhang, Yaliang Li, Bolin Ding, Jing Gao:
Practical Data Poisoning Attack against Next-Item Recommendation. WWW 2020: 2458-2464 - [i2]Hengtong Zhang, Yaliang Li, Bolin Ding, Jing Gao:
Practical Data Poisoning Attack against Next-Item Recommendation. CoRR abs/2004.03728 (2020)
2010 – 2019
- 2019
- [j2]Chen Ye, Qi Li, Hengtong Zhang, Hongzhi Wang, Jing Gao, Jianzhong Li:
AutoRepair: an automatic repairing approach over multi-source data. Knowl. Inf. Syst. 61(1): 227-257 (2019) - [j1]Chen Ye, Hongzhi Wang, Tingting Ma, Jing Gao, Hengtong Zhang, Jianzhong Li:
PatternFinder: Pattern discovery for truth discovery. Knowl. Based Syst. 176: 97-109 (2019) - [c5]Hengtong Zhang, Tianhang Zheng, Jing Gao, Chenglin Miao, Lu Su, Yaliang Li, Kui Ren:
Data Poisoning Attack against Knowledge Graph Embedding. IJCAI 2019: 4853-4859 - [c4]Liuyi Yao, Yaliang Li, Yezheng Li, Hengtong Zhang, Mengdi Huai, Jing Gao, Aidong Zhang:
DTEC: Distance Transformation Based Early Time Series Classification. SDM 2019: 486-494 - [i1]Hengtong Zhang, Tianhang Zheng, Jing Gao, Chenglin Miao, Lu Su, Yaliang Li, Kui Ren:
Towards Data Poisoning Attack against Knowledge Graph Embedding. CoRR abs/1904.12052 (2019) - 2018
- [c3]Hengtong Zhang, Fenglong Ma, Yaliang Li, Chao Zhang, Tianqi Wang, Yaqing Wang, Jing Gao, Lu Su:
Leveraging the Power of Informative Users for Local Event Detection. ASONAM 2018: 429-436 - [c2]Hengtong Zhang, Yaliang Li, Fenglong Ma, Jing Gao, Lu Su:
TextTruth: An Unsupervised Approach to Discover Trustworthy Information from Multi-Sourced Text Data. KDD 2018: 2729-2737 - 2016
- [c1]Hengtong Zhang, Qi Li, Fenglong Ma, Houping Xiao, Yaliang Li, Jing Gao, Lu Su:
Influence-Aware Truth Discovery. CIKM 2016: 851-860
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 21:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint