Alert button
Picture for Shuhan Yuan

Shuhan Yuan

Alert button

Backdoor Attack against One-Class Sequential Anomaly Detection Models

Feb 15, 2024
He Cheng, Shuhan Yuan

Viaarxiv icon

Algorithmic Recourse for Anomaly Detection in Multivariate Time Series

Sep 28, 2023
Xiao Han, Lu Zhang, Yongkai Wu, Shuhan Yuan

Figure 1 for Algorithmic Recourse for Anomaly Detection in Multivariate Time Series
Figure 2 for Algorithmic Recourse for Anomaly Detection in Multivariate Time Series
Figure 3 for Algorithmic Recourse for Anomaly Detection in Multivariate Time Series
Figure 4 for Algorithmic Recourse for Anomaly Detection in Multivariate Time Series
Viaarxiv icon

LogGPT: Log Anomaly Detection via GPT

Sep 25, 2023
Xiao Han, Shuhan Yuan, Mohamed Trabelsi

Figure 1 for LogGPT: Log Anomaly Detection via GPT
Figure 2 for LogGPT: Log Anomaly Detection via GPT
Figure 3 for LogGPT: Log Anomaly Detection via GPT
Figure 4 for LogGPT: Log Anomaly Detection via GPT
Viaarxiv icon

Robust Fraud Detection via Supervised Contrastive Learning

Aug 19, 2023
Vinay M. S., Shuhan Yuan, Xintao Wu

Figure 1 for Robust Fraud Detection via Supervised Contrastive Learning
Figure 2 for Robust Fraud Detection via Supervised Contrastive Learning
Figure 3 for Robust Fraud Detection via Supervised Contrastive Learning
Figure 4 for Robust Fraud Detection via Supervised Contrastive Learning
Viaarxiv icon

Achieving Counterfactual Fairness for Anomaly Detection

Mar 04, 2023
Xiao Han, Lu Zhang, Yongkai Wu, Shuhan Yuan

Figure 1 for Achieving Counterfactual Fairness for Anomaly Detection
Figure 2 for Achieving Counterfactual Fairness for Anomaly Detection
Figure 3 for Achieving Counterfactual Fairness for Anomaly Detection
Figure 4 for Achieving Counterfactual Fairness for Anomaly Detection
Viaarxiv icon

On Interpretable Anomaly Detection Using Causal Algorithmic Recourse

Dec 08, 2022
Xiao Han, Lu Zhang, Yongkai Wu, Shuhan Yuan

Figure 1 for On Interpretable Anomaly Detection Using Causal Algorithmic Recourse
Figure 2 for On Interpretable Anomaly Detection Using Causal Algorithmic Recourse
Figure 3 for On Interpretable Anomaly Detection Using Causal Algorithmic Recourse
Figure 4 for On Interpretable Anomaly Detection Using Causal Algorithmic Recourse
Viaarxiv icon

Generating Textual Adversaries with Minimal Perturbation

Nov 12, 2022
Xingyi Zhao, Lu Zhang, Depeng Xu, Shuhan Yuan

Figure 1 for Generating Textual Adversaries with Minimal Perturbation
Figure 2 for Generating Textual Adversaries with Minimal Perturbation
Figure 3 for Generating Textual Adversaries with Minimal Perturbation
Figure 4 for Generating Textual Adversaries with Minimal Perturbation
Viaarxiv icon

Robust Unstructured Knowledge Access in Conversational Dialogue with ASR Errors

Nov 08, 2022
Yik-Cheung Tam, Jiacheng Xu, Jiakai Zou, Zecheng Wang, Tinglong Liao, Shuhan Yuan

Figure 1 for Robust Unstructured Knowledge Access in Conversational Dialogue with ASR Errors
Figure 2 for Robust Unstructured Knowledge Access in Conversational Dialogue with ASR Errors
Figure 3 for Robust Unstructured Knowledge Access in Conversational Dialogue with ASR Errors
Figure 4 for Robust Unstructured Knowledge Access in Conversational Dialogue with ASR Errors
Viaarxiv icon

Fine-grained Anomaly Detection in Sequential Data via Counterfactual Explanations

Oct 09, 2022
He Cheng, Depeng Xu, Shuhan Yuan, Xintao Wu

Figure 1 for Fine-grained Anomaly Detection in Sequential Data via Counterfactual Explanations
Figure 2 for Fine-grained Anomaly Detection in Sequential Data via Counterfactual Explanations
Figure 3 for Fine-grained Anomaly Detection in Sequential Data via Counterfactual Explanations
Figure 4 for Fine-grained Anomaly Detection in Sequential Data via Counterfactual Explanations
Viaarxiv icon

Trustworthy Anomaly Detection: A Survey

Feb 15, 2022
Shuhan Yuan, Xintao Wu

Figure 1 for Trustworthy Anomaly Detection: A Survey
Figure 2 for Trustworthy Anomaly Detection: A Survey
Viaarxiv icon