default search action
Bocheng Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j6]Guangjing Wang, Nikolay Ivanov, Bocheng Chen, Qi Wang, ThanhVu Nguyen, Qiben Yan:
Graph Learning for Interactive Threat Detection in Heterogeneous Smart Home Rule Data. Proc. ACM Manag. Data 1(1): 102:1-102:27 (2023) - [j5]Mohannad Alhanahnah, Clay Stevens, Bocheng Chen, Qiben Yan, Hamid Bagheri:
IoTCom: Dissecting Interaction Threats in IoT Systems. IEEE Trans. Software Eng. 49(4): 1523-1539 (2023) - 2019
- [j4]Hongying Deng, Yang Zhang, Bocheng Chen, Yi Liu, Shengchang Zhang:
Special Probabilistic Prediction Model for Temperature Characteristics of Dynamic Fluid Processes. IEEE Access 7: 55064-55072 (2019) - 2010
- [j3]Haifeng Wang, Bocheng Chen, Houmin Yan:
Optimal inventory decisions in a multiperiod newsvendor problem with partially observed Markovian supply capacities. Eur. J. Oper. Res. 202(2): 502-517 (2010) - 2004
- [j2]Wai-Hung Ip, Bocheng Chen:
An enterprise model and the organisation of ERP. Int. J. Comput. Appl. Technol. 21(3): 79-86 (2004) - 2002
- [j1]Wai-Hung Ip, Bocheng Chen:
Organisation structure and enterprise modelling in ERP realisation. Int. J. Netw. Virtual Organisations 1(2): 170-183 (2002)
Conference and Workshop Papers
- 2024
- [c10]Bocheng Chen, Nikolay Ivanov, Guangjing Wang, Qiben Yan:
Multi-Turn Hidden Backdoor in Large Language Model-powered Chatbot Models. AsiaCCS 2024 - 2023
- [c9]Bocheng Chen, Advait Paliwal, Qiben Yan:
Jailbreaker in Jail: Moving Target Defense for Large Language Models. MTD@CCS 2023: 29-32 - [c8]Bocheng Chen, Masayuki Asahara:
Word Familiarity Rate Estimation for Japanese Functional Words Using a Bayesian Linear Mixed Model. PACLIC 2023: 107-112 - [c7]Bocheng Chen, Guangjing Wang, Hanqing Guo, Yuanda Wang, Qiben Yan:
Understanding Multi-Turn Toxic Behaviors in Open-Domain Chatbots. RAID 2023: 282-296 - [c6]Hanqing Guo, Guangjing Wang, Yuanda Wang, Bocheng Chen, Qiben Yan, Li Xiao:
PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection. RAID 2023: 366-380 - [c5]Bocheng Chen, Nikolay Ivanov, Guangjing Wang, Qiben Yan:
DynamicFL: Balancing Communication Dynamics and Client Manipulation for Federated Learning. SECON 2023: 312-320 - [c4]Yuanda Wang, Hanqing Guo, Guangjing Wang, Bocheng Chen, Qiben Yan:
VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation. WISEC 2023: 239-250 - 2017
- [c3]Yuqing Ye, Shaoran Zhang, Weijun Hong, Xiaolu Wang, Danting Huang, Bocheng Chen:
Audio similarity comparison system of english dubbing on android platform. ICIA 2017: 692-697 - 2004
- [c2]Bocheng Chen, Wai-Hung Ip, Peng Sheng, H. L. Yu:
Comparing Sales Strategies Using the Markov Chain Relationship Model. ICEB 2004: 266-271 - [c1]Bocheng Chen, Wai-Hung Ip, Yuebo Zhou, Bing Liang, H. L. Yu:
The Design of a Lean CRM Software Process Model. ICEB 2004: 335-339
Informal and Other Publications
- 2024
- [i10]Bocheng Chen, Hanqing Guo, Guangjing Wang, Yuanda Wang, Qiben Yan:
The Dark Side of Human Feedback: Poisoning Large Language Models via User Inputs. CoRR abs/2409.00787 (2024) - [i9]Guangjing Wang, Hanqing Guo, Yuanda Wang, Bocheng Chen, Ce Zhou, Qiben Yan:
Protecting Activity Sensing Data Privacy Using Hierarchical Information Dissociation. CoRR abs/2409.03796 (2024) - 2023
- [i8]Yuanda Wang, Hanqing Guo, Guangjing Wang, Bocheng Chen, Qiben Yan:
VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation. CoRR abs/2305.05736 (2023) - [i7]Bocheng Chen, Guangjing Wang, Hanqing Guo, Yuanda Wang, Qiben Yan:
Understanding Multi-Turn Toxic Behaviors in Open-Domain Chatbots. CoRR abs/2307.09579 (2023) - [i6]Bocheng Chen, Nikolay Ivanov, Guangjing Wang, Qiben Yan:
DynamicFL: Balancing Communication Dynamics and Client Manipulation for Federated Learning. CoRR abs/2308.06267 (2023) - [i5]Hanqing Guo, Guangjing Wang, Yuanda Wang, Bocheng Chen, Qiben Yan, Li Xiao:
PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection. CoRR abs/2309.06960 (2023) - [i4]Bocheng Chen, Advait Paliwal, Qiben Yan:
Jailbreaker in Jail: Moving Target Defense for Large Language Models. CoRR abs/2310.02417 (2023) - [i3]Guangjing Wang, Ce Zhou, Yuanda Wang, Bocheng Chen, Hanqing Guo, Qiben Yan:
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems. CoRR abs/2311.11796 (2023) - 2020
- [i2]Gang Peng, Zezao Lu, Bocheng Chen, Shanliang Chen, Dingxin He:
Robust tightly coupled pose estimation based on monocular vision, inertia, and wheel speed. CoRR abs/2003.01496 (2020) - [i1]Gang Peng, Zezao Lu, Shanliang Chen, Bocheng Chen, Dingxin He:
Monocular visual-inertial SLAM algorithm combined with wheel speed anomaly detection. CoRR abs/2003.09901 (2020)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 22:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint