Cited By
View all- Zhao YXu YLiu YYang LJiang WNing WSun XCui L(2025)Conditional Potential User Mining framework via explainable surrogate modelsExpert Systems with Applications10.1016/j.eswa.2024.125587262(125587)Online publication date: Mar-2025
- Gao MChen SGao YZhang ZChen YLi YYe QWang XChen Y(2024)Detecting compromised accounts caused by phone number recycling on e-commerce platforms: taking Meituan as an example电子商务平台 “二次放号” 被盗账号检测研究: 以美团为例Frontiers of Information Technology & Electronic Engineering10.1631/FITEE.230029125:8(1077-1095)Online publication date: 30-Aug-2024
- Gong JDing JMeng FChen GChen HZhao SLu HLi YBaeza-Yates RBonchi F(2024)A Population-to-individual Tuning Framework for Adapting Pretrained LM to On-device User Intent PredictionProceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3637528.3671984(896-907)Online publication date: 25-Aug-2024
- Show More Cited By