default search action
Jinyin Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [b1]Jinyin Chen, Ximin Zhang, Haibin Zheng:
Attacks, Defenses and Testing for Deep Learning. Springer 2024, ISBN 978-981-97-0424-8, pp. 5-399 - [j81]Jinyin Chen, Xiaoming Zhao, Haibin Zheng, Xiao Li, Sheng Xiang, Haifeng Guo:
Robust knowledge distillation based on feature variance against backdoored teacher model. Appl. Soft Comput. 163: 111907 (2024) - [j80]Ruoxi Chen, Haibo Jin, Jinyin Chen, Haibin Zheng, Shilian Zheng, Xiaoniu Yang, Xing Yang:
AdvCheck: Characterizing adversarial examples via local gradient checking. Comput. Secur. 136: 103540 (2024) - [j79]Jinyin Chen, Zhiqi Cao, Ruoxi Chen, Haibin Zheng, Xiao Li, Qi Xuan, Xing Yang:
Like teacher, like pupil: Transferring backdoors via feature-based knowledge distillation. Comput. Secur. 146: 104041 (2024) - [j78]Jinyin Chen, Guohan Huang, Haibin Zheng, Hang Du, Jian Zhang:
Robust explanations for graph neural network with neuron explanation component. Inf. Sci. 654: 119785 (2024) - [j77]Jinyin Chen, Mingjun Li, Tao Liu, Haibin Zheng, Hang Du, Yao Cheng:
Rethinking the defense against free-rider attack from the perspective of model weight evolving frequency. Inf. Sci. 668: 120527 (2024) - [j76]Jinyin Chen, Chengyu Jia, Yunjie Yan, Jie Ge, Haibin Zheng, Yao Cheng:
A Miss Is as Good as A Mile: Metamorphic Testing for Deep Learning Operators. Proc. ACM Softw. Eng. 1(FSE): 2005-2027 (2024) - [j75]Jinyin Chen, Danxin Liao, Shilian Zheng, Linhui Ye, Chenyu Jia, Haibin Zheng, Sheng Xiang:
RobustRMC: Robustness Interpretable Deep Neural Network for Radio Modulation Classification. IEEE Trans. Cogn. Commun. Netw. 10(4): 1218-1240 (2024) - [j74]Haibin Zheng, Haiyang Xiong, Haonan Ma, Guohan Huang, Jinyin Chen:
Link-Backdoor: Backdoor Attack on Link Prediction via Node Injection. IEEE Trans. Comput. Soc. Syst. 11(2): 1816-1831 (2024) - [j73]Haibin Zheng, Haiyang Xiong, Jinyin Chen, Haonan Ma, Guohan Huang:
Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via Motifs. IEEE Trans. Comput. Soc. Syst. 11(2): 2479-2493 (2024) - [j72]Haibin Zheng, Minying Ma, Haonan Ma, Jinyin Chen, Haiyang Xiong, Zhijun Yang:
TEGDetector: A Phishing Detector That Knows Evolving Transaction Behaviors. IEEE Trans. Comput. Soc. Syst. 11(3): 3988-4000 (2024) - [j71]Jinyin Chen, Haibin Zheng, Tao Liu, Jiawei Liu, Yao Cheng, Xuhong Zhang, Shouling Ji:
EdgePro: Edge Deep Learning Model Protection via Neuron Authorization. IEEE Trans. Dependable Secur. Comput. 21(5): 4967-4981 (2024) - [j70]Chengyu Jia, Jinyin Chen, Shouling Ji, Yao Cheng, Haibin Zheng, Qi Xuan:
Backdoor Online Tracing With Evolving Graphs. IEEE Trans. Inf. Forensics Secur. 19: 10314-10327 (2024) - [j69]Jinyin Chen, Haiyang Xiong, Haibin Zheng, Jian Zhang, Yi Liu:
Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction. IEEE Trans. Netw. Sci. Eng. 11(1): 525-542 (2024) - [j68]Jinyin Chen, Minying Ma, Haonan Ma, Haibin Zheng, Jian Zhang:
An Empirical Evaluation of the Data Leakage in Federated Graph Learning. IEEE Trans. Netw. Sci. Eng. 11(2): 1605-1618 (2024) - [j67]Jinyin Chen, Jie Ge, Shilian Zheng, Linhui Ye, Haibin Zheng, Weiguo Shen, Keqiang Yue, Xiaoniu Yang:
AIR: Threats of Adversarial Attacks on Deep Learning-Based Information Recovery. IEEE Trans. Wirel. Commun. 23(9): 10698-10711 (2024) - [c32]Mingqi Lv, Hongzhe Gao, Xuebo Qiu, Tieming Chen, Tiantian Zhu, Jinyin Chen, Shouling Ji:
TREC: APT Tactic / Technique Recognition via Few-Shot Provenance Subgraph Learning. CCS 2024: 139-152 - [c31]Haibo Jin, Ruoxi Chen, Jinyin Chen, Haibin Zheng, Yang Zhang, Haohan Wang:
CatchBackdoor: Backdoor Detection via Critical Trojan Neural Path Fuzzing. ECCV (47) 2024: 90-106 - [c30]Ruoxi Chen, Haibo Jin, Yixin Liu, Jinyin Chen, Haohan Wang, Lichao Sun:
EditShield: Protecting Unauthorized Image Editing by Instruction-Guided Diffusion Models. ECCV (63) 2024: 126-142 - [i45]Haibo Jin, Ruoxi Chen, Andy Zhou, Jinyin Chen, Yang Zhang, Haohan Wang:
GUARD: Role-playing to Generate Natural-language Jailbreakings to Test Guideline Adherence of Large Language Models. CoRR abs/2402.03299 (2024) - [i44]Jinyin Chen, Xiaoming Zhao, Haibin Zheng, Xiao Li, Sheng Xiang, Haifeng Guo:
Robust Knowledge Distillation Based on Feature Variance Against Backdoored Teacher Model. CoRR abs/2406.03409 (2024) - [i43]Jinyin Chen, Danxin Liao, Sheng Xiang, Haibin Zheng:
LiDAttack: Robust Black-box Attack on LiDAR-based Object Detection. CoRR abs/2411.01889 (2024) - 2023
- [j66]Jinyin Chen, Xueke Wang, Yan Zhang, Haibin Zheng, Shanqing Yu, Liang Bao:
Agent manipulator: Stealthy strategy attacks on deep reinforcement learning. Appl. Intell. 53(10): 12831-12858 (2023) - [j65]Jinyin Chen, Jie Ge, Haibin Zheng:
ActGraph: prioritization of test cases based on deep neural network activation graph. Autom. Softw. Eng. 30(1) (2023) - [j64]Haibin Zheng, Xiaohao Li, Jinyin Chen, Jianfeng Dong, Yan Zhang, Changting Lin:
One4All: Manipulate one agent to poison the cooperative multi-agent reinforcement learning. Comput. Secur. 124: 103005 (2023) - [j63]Jinyin Chen, Shulong Hu, Haibin Zheng, Chang-you Xing, Guomin Zhang:
GAIL-PT: An intelligent penetration testing framework with generative adversarial imitation learning. Comput. Secur. 126: 103055 (2023) - [j62]Haibin Zheng, Jinyin Chen, Wenchang Shangguan, Zhaoyan Ming, Xing Yang, Zhijun Yang:
GONE: A generic O(1) NoisE layer for protecting privacy of deep neural networks. Comput. Secur. 135: 103471 (2023) - [j61]Jinyin Chen, Mingjun Li, Yao Cheng, Haibin Zheng:
FedRight: An effective model copyright protection for federated learning. Comput. Secur. 135: 103504 (2023) - [j60]Jinyin Chen, Haiyang Xiong, Haibin Zheng, Dunjie Zhang, Jian Zhang, Mingwei Jia, Yi Liu:
EGC2: Enhanced graph classification with easy graph compression. Inf. Sci. 629: 376-397 (2023) - [j59]Haibo Jin, Ruoxi Chen, Haibin Zheng, Jinyin Chen, Yao Cheng, Yue Yu, Tieming Chen, Xianglong Liu:
Excitement surfeited turns to errors: Deep learning testing framework based on excitable neurons. Inf. Sci. 637: 118936 (2023) - [j58]Tao Liu, Mingjun Li, Haibin Zheng, Zhaoyan Ming, Jinyin Chen:
Evil vs evil: using adversarial examples to against backdoor attack in federated learning. Multim. Syst. 29(2): 553-568 (2023) - [j57]Haibin Zheng, Tao Liu, Rongchang Li, Jinyin Chen:
PoE: Poisoning Enhancement Through Label Smoothing in Federated Learning. IEEE Trans. Circuits Syst. II Express Briefs 70(8): 3129-3133 (2023) - [j56]Shanqing Yu, Yongqi Wang, Jiaxiang Li, Xu Fang, Jinyin Chen, Ziwan Zheng, Chenbo Fu:
An Improved Differential Evolution Framework Using Network Topology Information for Critical Nodes Detection. IEEE Trans. Comput. Soc. Syst. 10(2): 448-457 (2023) - [j55]Jinyin Chen, Guohan Huang, Haibin Zheng, Shanqing Yu, Wenrong Jiang, Chen Cui:
Graph-Fraudster: Adversarial Attacks on Graph Neural Network-Based Vertical Federated Learning. IEEE Trans. Comput. Soc. Syst. 10(2): 492-506 (2023) - [j54]Jinyin Chen, Xiaodong Xu, Lihong Chen, Zhongyuan Ruan, Zhaoyan Ming, Yi Liu:
CTL-DIFF: Control Information Diffusion in Social Network by Structure Optimization. IEEE Trans. Comput. Soc. Syst. 10(3): 1115-1129 (2023) - [j53]Jinyin Chen, Guohan Huang, Haibin Zheng, Dunjie Zhang, Xiang Lin:
Graphfool: Targeted Label Adversarial Attack on Graph Embedding. IEEE Trans. Comput. Soc. Syst. 10(5): 2523-2535 (2023) - [j52]Shuang Gao, Yun Dai, Yongchao Xu, Jinyin Chen, Yi Liu:
Generative adversarial network-assisted image classification for imbalanced tire X-ray defect detection. Trans. Inst. Meas. Control 45(8): 1492-1504 (2023) - [j51]Jinyin Chen, Jian Zhang, Zhi Chen, Min Du, Qi Xuan:
Time-Aware Gradient Attack on Dynamic Network Link Prediction. IEEE Trans. Knowl. Data Eng. 35(2): 2091-2102 (2023) - [j50]Jinyin Chen, Chengyu Jia, Haibin Zheng, Ruoxi Chen, Chenbo Fu:
Is Multi-Modal Necessarily Better? Robustness Evaluation of Multi-Modal Fake News Detection. IEEE Trans. Netw. Sci. Eng. 10(6): 3144-3158 (2023) - [c29]Haonan Ma, Can Wang, Yunwei Zhao, Luhua Wang, Xiulian Cao, Jinyin Chen, Han Han, Meichen Liu:
An in-depth analysis of robustness and accuracy of recommendation systems. ICDM (Workshops) 2023: 1509-1515 - [c28]Haibin Zheng, Jinyin Chen, Haibo Jin:
CertPri: Certifiable Prioritization for Deep Neural Networks via Movement Cost in Feature Space. ASE 2023: 1-13 - [i42]Jinyin Chen, Mingjun Li, Yao Cheng, Haibin Zheng:
FedRight: An Effective Model Copyright Protection for Federated Learning. CoRR abs/2303.10399 (2023) - [i41]Jinyin Chen, Haibin Zheng, Tao Liu, Rongchang Li, Yao Cheng, Xuhong Zhang, Shouling Ji:
Edge Deep Learning Model Protection via Neuron Authorization. CoRR abs/2303.12397 (2023) - [i40]Ruoxi Chen, Haibo Jin, Jinyin Chen, Haibin Zheng:
AdvCheck: Characterizing Adversarial Examples via Local Gradient Checking. CoRR abs/2303.18131 (2023) - [i39]Haibin Zheng, Jinyin Chen, Haibo Jin:
CertPri: Certifiable Prioritization for Deep Neural Networks via Movement Cost in Feature Space. CoRR abs/2307.09375 (2023) - [i38]Jinyin Chen, Jie Ge, Shilian Zheng, Linhui Ye, Haibin Zheng, Weiguo Shen, Keqiang Yue, Xiaoniu Yang:
AIR: Threats of Adversarial Attacks on Deep Learning-Based Information Recovery. CoRR abs/2309.16706 (2023) - [i37]Ruoxi Chen, Haibo Jin, Jinyin Chen, Lichao Sun:
EditShield: Protecting Unauthorized Image Editing by Instruction-guided Diffusion Models. CoRR abs/2311.12066 (2023) - 2022
- [j49]Jinyin Chen, Xueke Wang, Xuanheng Xu:
GC-LSTM: graph convolution embedded LSTM for dynamic network link prediction. Appl. Intell. 52(7): 7513-7528 (2022) - [j48]Haibo Jin, Jinyin Chen, Haibin Zheng, Zhen Wang, Jun Xiao, Shanqing Yu, Zhaoyan Ming:
ROBY: Evaluating the adversarial robustness of a deep model by its decision boundaries. Inf. Sci. 587: 97-122 (2022) - [j47]Ruoxi Chen, Jinyin Chen, Haibin Zheng, Qi Xuan, Zhaoyan Ming, Wenrong Jiang, Chen Cui:
Salient feature extractor for adversarial defense on deep neural networks. Inf. Sci. 600: 118-143 (2022) - [j46]Yunyi Xie, Jinyin Chen, Jian Zhang, Xincheng Shu, Qi Xuan:
Time-Series Snapshot Network for Partner Recommendation: A Case Study on OSS. IEEE Trans. Comput. Soc. Syst. 9(4): 1048-1059 (2022) - [j45]Haibin Zheng, Jinyin Chen, Hang Du, Weipeng Zhu, Shouling Ji, Xuhong Zhang:
GRIP-GAN: An Attack-Free Defense Through General Robust Inverse Perturbation. IEEE Trans. Dependable Secur. Comput. 19(6): 4204-4224 (2022) - [j44]Jinyin Chen, Dunjie Zhang, Zhaoyan Ming, Kejie Huang, Wenrong Jiang, Chen Cui:
GraphAttacker: A General Multi-Task Graph Attack Framework. IEEE Trans. Netw. Sci. Eng. 9(2): 577-595 (2022) - [c27]Bin Zhu, Zhaoquan Gu, Le Wang, Jinyin Chen, Qi Xuan:
Improving Robustness of Language Models from a Geometry-aware Perspective. ACL (Findings) 2022: 3115-3125 - [c26]Xinyi Xie, Haibin Zheng, Hu Li, Ling Pang, Jinyin Chen:
Attack and Defense Methods for Graph Vertical Federation Learning. CSSE 2022: 175-179 - [c25]Jinyin Chen, Tianle Yu, Changan Wu, Haibin Zheng, Wenhong Zhao, Ling Pang, Hu Li:
Adversarial Attack Detection Based on Example Semantics and Model Activation Features. DSIT 2022: 1-6 - [c24]Yao Lu, Wen Yang, Yunzhe Zhang, Zuohui Chen, Jinyin Chen, Qi Xuan, Zhen Wang, Xiaoniu Yang:
Understanding the Dynamics of DNNs Using Graph Modularity. ECCV (12) 2022: 225-242 - [c23]Haibin Zheng, Zhiqing Chen, Tianyu Du, Xuhong Zhang, Yao Cheng, Shouling Ji, Jingyi Wang, Yue Yu, Jinyin Chen:
NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification. ICSE 2022: 1519-1531 - [c22]Chong Fu, Xuhong Zhang, Shouling Ji, Jinyin Chen, Jingzheng Wu, Shanqing Guo, Jun Zhou, Alex X. Liu, Ting Wang:
Label Inference Attacks Against Vertical Federated Learning. USENIX Security Symposium 2022: 1397-1414 - [i36]Haibo Jin, Ruoxi Chen, Haibin Zheng, Jinyin Chen, Zhenguang Liu, Qi Xuan, Yue Yu, Yao Cheng:
DeepSensor: Deep Learning Testing Framework Based on Neuron Sensitivity. CoRR abs/2202.07464 (2022) - [i35]Jinyin Chen, Shulong Hu, Haibin Zheng, Chang-you Xing, Guomin Zhang:
GAIL-PT: A Generic Intelligent Penetration Testing Framework with Generative Adversarial Imitation Learning. CoRR abs/2204.01975 (2022) - [i34]Bin Zhu, Zhaoquan Gu, Le Wang, Jinyin Chen, Qi Xuan:
Improving robustness of language models from a geometry-aware perspective. CoRR abs/2204.13309 (2022) - [i33]Jinyin Chen, Mingjun Li, Tao Liu, Haibin Zheng, Yao Cheng, Chang-Ting Lin:
Rethinking the Defense Against Free-rider Attack From the Perspective of Model Weight Evolving Frequency. CoRR abs/2206.05406 (2022) - [i32]Jinyin Chen, Chengyu Jia, Haibin Zheng, Ruoxi Chen, Chenbo Fu:
Is Multi-Modal Necessarily Better? Robustness Evaluation of Multi-modal Fake News Detection. CoRR abs/2206.08788 (2022) - [i31]Haibin Zheng, Haiyang Xiong, Haonan Ma, Guohan Huang, Jinyin Chen:
Link-Backdoor: Backdoor Attack on Link Prediction via Node Injection. CoRR abs/2208.06776 (2022) - [i30]Haibin Zheng, Haiyang Xiong, Jinyin Chen, Haonan Ma, Guohan Huang:
Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via Motifs. CoRR abs/2210.13710 (2022) - [i29]Jinyin Chen, Jie Ge, Haibin Zheng:
ActGraph: Prioritization of Test Cases Based on Deep Neural Network Activation Graph. CoRR abs/2211.00273 (2022) - 2021
- [j43]Jinyin Chen, Xueke Wang, Mengmeng Su, Xiang Lin:
A fast detector generation algorithm for negative selection. Appl. Intell. 51(7): 4525-4547 (2021) - [j42]Jinyin Chen, Haibin Zheng, Hui Xiong, Ruoxi Chen, Tianyu Du, Zhen Hong, Shouling Ji:
FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique. Comput. Secur. 104: 102220 (2021) - [j41]Jinyin Chen, Linhui Ye, Zhaoyan Ming:
MASS: Multi-task anthropomorphic speech synthesis framework. Comput. Speech Lang. 70: 101243 (2021) - [j40]Jinyin Chen, Haibin Zheng, Wenchang Shangguan, Liangying Liu, Shouling Ji:
ACT-Detector: Adaptive channel transformation-based light-weighted detector for adversarial attacks. Inf. Sci. 564: 163-192 (2021) - [j39]Jinyin Chen, Hui Cui, Shenghuan Miao, Changan Wu, Haibin Zheng, Shilian Zheng, Liang Huang, Qi Xuan:
FEM: Feature extraction and mapping for radio modulation classification. Phys. Commun. 45: 101279 (2021) - [j38]Jinyin Chen, Longyuan Zhang, Haibin Zheng, Xueke Wang, Zhaoyan Ming:
DeepPoison: Feature Transfer Based Stealthy Poisoning Attack for DNNs. IEEE Trans. Circuits Syst. II Express Briefs 68(7): 2618-2622 (2021) - [j37]Jinyin Chen, Hui Xiong, Haibin Zheng, Zhaoyan Ming, Yi Liu:
Anti-Interpolation: An Attack Facilitator Hiding Adversaries Into Images. IEEE Trans. Circuits Syst. II Express Briefs 68(7): 2670-2674 (2021) - [j36]Liang Huang, You Zhang, Weijian Pan, Jinyin Chen, Li Ping Qian, Yuan Wu:
Visualizing Deep Learning-Based Radio Modulation Classifier. IEEE Trans. Cogn. Commun. Netw. 7(1): 47-58 (2021) - [j35]Jinyin Chen, Yixian Chen, Lihong Chen, Minghao Zhao, Qi Xuan:
Multiscale Evolutionary Perturbation Attack on Community Detection. IEEE Trans. Comput. Soc. Syst. 8(1): 62-75 (2021) - [j34]Jinyin Chen, Yixian Chen, Haibin Zheng, Shijing Shen, Shanqing Yu, Dan Zhang, Qi Xuan:
MGA: Momentum Gradient Attack on Network. IEEE Trans. Comput. Soc. Syst. 8(1): 99-109 (2021) - [j33]Jinyin Chen, Xiang Lin, Hui Xiong, Yangyang Wu, Haibin Zheng, Qi Xuan:
Smoothing Adversarial Training for GNN. IEEE Trans. Comput. Soc. Syst. 8(3): 618-629 (2021) - [j32]Jinyin Chen, Jian Zhang, Xuanheng Xu, Chenbo Fu, Dan Zhang, Qingpeng Zhang, Qi Xuan:
E-LSTM-D: A Deep Learning Framework for Dynamic Network Link Prediction. IEEE Trans. Syst. Man Cybern. Syst. 51(6): 3699-3712 (2021) - [c21]Guodong Jiang, Jingjing Zhang, Jinyin Chen, Haibin Zheng, Zhiqing Chen, Liang Bao:
Unsupervised Face Recognition Algorithm based on Fast Density Clustering Algorithm. AISS 2021: 65:1-65:6 - [c20]Dunjie Zhang, Jinyin Chen, Xiaosong Lu:
Blockchain Phishing Scam Detection via Multi-channel Graph Classification. BlockSys 2021: 241-256 - [p1]Shanqing Yu, Jun Zheng, Yongqi Wang, Jinyin Chen, Qi Xuan, Qingpeng Zhang:
Network Embedding Attack: An Euclidean Distance Based Method. MDATA: A New Knowledge Representation Model 2021: 131-151 - [i28]Jinyin Chen, Longyuan Zhang, Haibin Zheng, Xueke Wang, Zhaoyan Ming:
DeepPoison: Feature Transfer Based Stealthy Poisoning Attack. CoRR abs/2101.02562 (2021) - [i27]Jinyin Chen, Dunjie Zhang, Zhaoyan Ming, Kejie Huang:
GraphAttacker: A General Multi-Task GraphAttack Framework. CoRR abs/2101.06855 (2021) - [i26]Jinyin Chen, Xiang Lin, Dunjie Zhang, Wenrong Jiang, Guohan Huang, Hui Xiong, Yun Xiang:
Graphfool: Targeted Label Adversarial Attack on Graph Embedding. CoRR abs/2102.12284 (2021) - [i25]Jinyin Chen, Linhui Ye, Zhaoyan Ming:
MASS: Multi-task Anthropomorphic Speech Synthesis Framework. CoRR abs/2105.04124 (2021) - [i24]Jinyin Chen, Ruoxi Chen, Haibin Zheng, Zhaoyan Ming, Wenrong Jiang, Chen Cui:
Salient Feature Extractor for Adversarial Defense on Deep Neural Networks. CoRR abs/2105.06807 (2021) - [i23]Jinyin Chen, Dunjie Zhang, Zhaoyan Ming, Mingwei Jia, Yi Liu:
EGC2: Enhanced Graph Classification with Easy Graph Compression. CoRR abs/2107.07737 (2021) - [i22]Dunjie Zhang, Jinyin Chen:
Blockchain Phishing Scam Detection via Multi-channel Graph Classification. CoRR abs/2108.08456 (2021) - [i21]Jinyin Chen, Haiyang Xiong, Haibin Zheng, Jian Zhang, Guodong Jiang, Yi Liu:
Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction. CoRR abs/2110.03875 (2021) - [i20]Jinyin Chen, Guohan Huang, Shanqing Yu, Wenrong Jiang, Chen Cui:
Graph-Fraudster: Adversarial Attacks on Graph Neural Network Based Vertical Federated Learning. CoRR abs/2110.06468 (2021) - [i19]Jinyin Chen, Haiyang Xiong, Dunjie Zhang, Zhenguang Liu, Jiajing Wu:
TEGDetector: A Phishing Detector that Knows Evolving Transaction Behaviors. CoRR abs/2111.15446 (2021) - [i18]Haibin Zheng, Zhiqing Chen, Tianyu Du, Xuhong Zhang, Yao Cheng, Shouling Ji, Jingyi Wang, Yue Yu, Jinyin Chen:
NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification. CoRR abs/2112.13214 (2021) - 2020
- [j31]Jinyin Chen, Haibin Zheng, Ruoxi Chen, Hui Xiong:
RCA-SOC: A novel adversarial defense by refocusing on critical areas and strengthening object contours. Comput. Secur. 96: 101916 (2020) - [j30]Jinyin Chen:
A novel radius adaptive based on center-optimized hybrid detector generation algorithm. IEEE CAA J. Autom. Sinica 7(6): 1627-1637 (2020) - [j29]Jungan Chen, Jinyin Chen, Dongyong Yang:
A novel clustering algorithm based on the deviation factor model. Int. J. Comput. Sci. Eng. 21(2): 173-187 (2020) - [j28]Jinyin Chen, Keke Hu, Yitao Yang, Yi Liu, Qi Xuan:
Collective transfer learning for defect prediction. Neurocomputing 416: 103-116 (2020) - [j27]Jinyin Chen, Yangyang Wu, Chengyu Jia, Haibin Zheng, Guohan Huang:
Customizable text generation via conditional text generative adversarial network. Neurocomputing 416: 125-135 (2020) - [j26]Jin-Yin Chen, Haibin Zheng, Hui Xiong, Shijing Shen, Mengmeng Su:
MAG-GAN: Massive attack generator via GAN. Inf. Sci. 536: 67-90 (2020) - [j25]Yun Xiang, Zhuangzhi Chen, Zuohui Chen, Zebin Fang, Haiyang Hao, Jinyin Chen, Yi Liu, Zhefu Wu, Qi Xuan, Xiaoniu Yang:
Open DNN Box by Power Side-Channel Attack. IEEE Trans. Circuits Syst. 67-II(11): 2717-2721 (2020) - [j24]Jinyin Chen, Xiang Lin, Ziqiang Shi, Yi Liu:
Link Prediction Adversarial Attack Via Iterative Gradient Attack. IEEE Trans. Comput. Soc. Syst. 7(4): 1081-1094 (2020) - [c19]Jinyin Chen, Huiling Xu, Jinhuan Wang, Qi Xuan, Xuhong Zhang:
Adversarial Detection on Graph Structured Data. PPMLP@CCS 2020: 37-41 - [c18]Jinyin Chen, Longyuan Zhang, Haibin Zheng, Qi Xuan:
SPA: Stealthy Poisoning Attack. CIAT 2020: 303-309 - [c17]Jian Zhang, Jun Zheng, Jinyin Chen, Qi Xuan:
Hyper-Substructure Enhanced Link Predictor. CIKM 2020: 2305-2308 - [c16]Jinyin Chen, Changan Wu, Shijing Shen, Xuhong Zhang, Jianhao Chen:
DAS-AST: Defending Against Model Stealing Attacks Based on Adaptive Softmax Transformation. Inscrypt 2020: 21-36 - [c15]Shanqing Yu, Jun Zheng, Jinyin Chen, Qi Xuan, Qingpeng Zhang:
Unsupervised Euclidean Distance Attack on Network Embedding. DSC 2020: 71-77 - [c14]Jinyin Chen, Keke Hu, Yue Yu, Zhuangzhi Chen, Qi Xuan, Yi Liu, Vladimir Filkov:
Software visualization and deep transfer learning for effective software defect prediction. ICSE 2020: 578-589 - [c13]Jinyin Chen, Shenghuan Miao, Haibin Zheng, Shilian Zheng:
Feature Explainable Deep Classification for Signal Modulation Recognition. IECON 2020: 3543-3548 - [c12]Jinyin Chen, Dunjie Zhang, Xiang Lin:
Adaptive Adversarial Attack on Graph Embedding via GAN. SocialSec 2020: 72-84 - [c11]Jinyin Chen, Xueke Wang, Yan Zhang, Haibin Zheng, Shouling Ji:
Attention Mechanism Based Adversarial Attack Against Deep Reinforcement Learning. SpaCCS 2020: 19-43 - [i17]Jinyin Chen, Yixian Chen, Haibin Zheng, Shijing Shen, Shanqing Yu, Dan Zhang, Qi Xuan:
MGA: Momentum Gradient Attack on Network. CoRR abs/2002.11320 (2020) - [i16]Liang Huang, You Zhang, Weijian Pan, Jinyin Chen, Li Ping Qian, Yuan Wu:
Visualizing Deep Learning-based Radio Modulation Classifier. CoRR abs/2005.02175 (2020) - [i15]Jinyin Chen, Yunyi Xie, Jian Zhang, Xincheng Shu, Qi Xuan:
Time-Series Snapshot Network as A New Model for Role Recommendation in OSS. CoRR abs/2011.09883 (2020) - [i14]Jinyin Chen, Zhen Wang, Haibin Zheng, Jun Xiao, Zhaoyan Ming:
ROBY: Evaluating the Robustness of a Deep Model by its Decision Boundaries. CoRR abs/2012.10282 (2020)
2010 – 2019
- 2019
- [j23]Jinyin Chen, Yitao Yang, Keke Hu, Qi Xuan, Yi Liu, Chao Yang:
Multiview Transfer Learning for Software Defect Prediction. IEEE Access 7: 8901-8916 (2019) - [j22]Qi Xuan, Yewei Yu, Jinyin Chen, Zhongyuan Ruan, Zhong Fu, Zicong Lv:
Robustness Analysis of Bipartite Task Assignment Networks: A Case Study in Hospital Logistics System. IEEE Access 7: 58484-58494 (2019) - [j21]Jinyin Chen, Xiang Lin, Qi Xuan, Yun Xiang:
FGCH: a fast and grid based clustering algorithm for hybrid data stream. Appl. Intell. 49(4): 1228-1244 (2019) - [j20]Jinyin Chen, Haibin Zheng, Hui Xiong, Yangyang Wu, Xiang Lin, Shiyan Ying, Qi Xuan:
DGEPN-GCEN2V: a new framework for mining GGI and its application in biomarker detection. Sci. China Inf. Sci. 62(9): 199104:1-199104:3 (2019) - [j19]Jinyin Chen, Mengmeng Su, Shijing Shen, Hui Xiong, Haibin Zheng:
POBA-GA: Perturbation optimized black-box adversarial attacks via genetic algorithm. Comput. Secur. 85: 89-106 (2019) - [j18]Jinyin Chen, Zhen Wang, Jinyu Chen, Zhiqing Chen, Haibin Zhen:
基于深度学习的智能教学系统的设计与研究 (Design and Research on Intelligent Teaching System Based on Deep Learning). 计算机科学 46(6A): 550-554 (2019) - [j17]Jinyin Chen, Guohan Huang, Yangyang Wu, Chengyu Jia:
基于双循环图的虚假评论检测算法 (Double Cycle Graph Based Fraud Review Detection Algorithm). 计算机科学 46(9): 229-236 (2019) - [j16]Jinyin Chen, Yangyang Wu, Lu Fan, Xiang Lin, Haibin Zheng, Shanqing Yu, Qi Xuan:
N2VSCDNNR: A Local Recommender System Based on Node2vec and Rich Information Network. IEEE Trans. Comput. Soc. Syst. 6(3): 456-466 (2019) - [j15]Jinyin Chen, Lihong Chen, Yixian Chen, Minghao Zhao, Shanqing Yu, Qi Xuan, Xiaoniu Yang:
GA-Based Q-Attack on Community Detection. IEEE Trans. Comput. Soc. Syst. 6(3): 491-503 (2019) - [j14]Jinyin Chen, Yangyang Wu, Xuanheng Xu, Haibin Zheng, Zhongyuan Ruan, Qi Xuan:
PSO-ANE: Adaptive Network Embedding With Particle Swarm Optimization. IEEE Trans. Comput. Soc. Syst. 6(4): 649-659 (2019) - [c10]Jinyin Chen, Haibin Zheng, Mengmeng Su, Tianyu Du, Chang-Ting Lin, Shouling Ji:
Invisible Poisoning: Highly Stealthy Targeted Poisoning Attack. Inscrypt 2019: 173-198 - [c9]Jinyin Chen, Zhen Wang, Haibin Zheng, Liangying Liu, Ziling Zhu, Shiyan Ying, Yitao Wei:
DGFE-VG: Dynamic Gene Feature Extraction via Visibility Graph. ICMHI 2019: 119-124 - [c8]Jinyin Chen, Zhen Wang, Kai-hui Cheng, Haibin Zheng, An-tao Pan:
Out-of-store Object Detection Based on Deep Learning. ICMLC 2019: 423-428 - [c7]Jinyin Chen, Yitao Yang, Keke Hu, Haibin Zheng, Zhen Wang:
DAD-MCNN: DDoS Attack Detection via Multi-channel CNN. ICMLC 2019: 484-488 - [i13]Jinyin Chen, Jian Zhang, Xuanheng Xu, Chengbo Fu, Dan Zhang, Qingpeng Zhang, Qi Xuan:
E-LSTM-D: A Deep Learning Framework for Dynamic Network Link Prediction. CoRR abs/1902.08329 (2019) - [i12]Jinyin Chen, Yangyang Wu, Xiang Lin, Qi Xuan:
Can Adversarial Network Attack be Defended? CoRR abs/1903.05994 (2019) - [i11]Jinyin Chen, Yangyang Wu, Lu Fan, Xiang Lin, Haibin Zheng, Shanqing Yu, Qi Xuan:
N2VSCDNNR: A Local Recommender System Based on Node2vec and Rich Information Network. CoRR abs/1904.12605 (2019) - [i10]Qi Xuan, Jun Zheng, Lihong Chen, Shanqing Yu, Jinyin Chen, Dan Zhang, Qingpeng Zhang:
Unsupervised Euclidean Distance Attack on Network Embedding. CoRR abs/1905.11015 (2019) - [i9]Jinyin Chen, Mengmeng Su, Shijing Shen, Hui Xiong, Haibin Zheng:
POBA-GA: Perturbation Optimized Black-Box Adversarial Attacks via Genetic Algorithm. CoRR abs/1906.03181 (2019) - [i8]Yun Xiang, Zhuangzhi Chen, Zuohui Chen, Zebin Fang, Haiyang Hao, Jinyin Chen, Yi Liu, Zhefu Wu, Qi Xuan, Xiaoniu Yang:
Open DNN Box by Power Side-Channel Attack. CoRR abs/1907.10406 (2019) - [i7]Jinyin Chen, Yixian Chen, Lihong Chen, Minghao Zhao, Qi Xuan:
Multiscale Evolutionary Perturbation Attack on Community Detection. CoRR abs/1910.09741 (2019) - [i6]Jinyin Chen, Jian Zhang, Zhi Chen, Min Du, Qi Xuan:
Time-aware Gradient Attack on Dynamic Network Link Prediction. CoRR abs/1911.10561 (2019) - 2018
- [j13]Jinyin Chen, Yangyang Wu, Xiang Lin, Qi Xuan:
DOE-AND-SCA: A Novel SCA Based on DNN With Optimal Eigenvectors and Automatic Cluster Number Determination. IEEE Access 6: 20764-20778 (2018) - [j12]Jinyin Chen, Haibin Zheng, Xiang Lin, Yangyang Wu, Mengmeng Su:
A novel image segmentation method based on fast density clustering algorithm. Eng. Appl. Artif. Intell. 73: 92-110 (2018) - [j11]Jinyin Chen, Keke Hu, Yuwei Li:
基于MB-RRT*的无人机多点航迹规划算法研究 (Research on UAV Multi-point Navigation Algorithm Based on MB-RRT*). 计算机科学 45(6A): 85-90 (2018) - [j10]Jinyin Chen, Hui Xiong, Haibin Zheng:
基于粒子群算法的支持向量机的参数优化 (Parameters Optimization for SVM Based on Particle Swarm Algorithm). 计算机科学 45(6): 197-203 (2018) - [j9]Jinyin Chen, Xuanyan Xu, Mengmeng Su:
基于自适应免疫计算的网络攻击检测研究 (Research on Network Attack Detection Based on Self-adaptive Immune Computing). 计算机科学 45(6A): 364-370 (2018) - [j8]Jinyin Chen, Hang Fang, Xiang Lin, Haibin Zheng, Dongyong Yang, Xiao Zhou:
基于在线学习行为分析的个性化学习推荐 (Personal Learning Recommendation Based on Online Learning Behavior Analysis). 计算机科学 45(11A): 422-426 (2018) - [j7]Chenbo Fu, Minghao Zhao, Lu Fan, Xinyi Chen, Jinyin Chen, Zhefu Wu, Yongxiang Xia, Qi Xuan:
Link Weight Prediction Using Supervised Learning Methods and Its Application to Yelp Layered Network. IEEE Trans. Knowl. Data Eng. 30(8): 1507-1518 (2018) - [i5]Jinyin Chen, Yangyang Wu, Xuanheng Xu, Yixian Chen, Haibin Zheng, Qi Xuan:
Fast Gradient Attack on Network Embedding. CoRR abs/1809.02797 (2018) - [i4]Jinyin Chen, Ziqiang Shi, Yangyang Wu, Xuanheng Xu, Haibin Zheng:
Link Prediction Adversarial Attack. CoRR abs/1810.01110 (2018) - [i3]Jinyin Chen, Lihong Chen, Yixian Chen, Minghao Zhao, Shanqing Yu, Qi Xuan, Xiaoniu Yang:
GA Based Q-Attack on Community Detection. CoRR abs/1811.00430 (2018) - [i2]Jinyin Chen, Haibin Zheng, Hui Xiong, Mengmeng Su:
FineFool: Fine Object Contour Attack via Attention. CoRR abs/1812.01713 (2018) - [i1]Jinyin Chen, Xuanheng Xu, Yangyang Wu, Haibin Zheng:
GC-LSTM: Graph Convolution Embedded LSTM for Dynamic Link Prediction. CoRR abs/1812.04206 (2018) - 2017
- [j6]Jinyin Chen, Xiang Lin, Haibing Zheng, Xintong Bao:
A novel cluster center fast determination clustering algorithm. Appl. Soft Comput. 57: 539-555 (2017) - [j5]Shanqing Yu, Deng Zhang, Shingo Mabu, Jinyin Chen, Kotaro Hirasawa:
Improving the robustness of GNP-PCA using the multiagent system. Appl. Soft Comput. 61: 757-764 (2017) - [j4]Jungan Chen, Jinyin Chen, Dongyong Yang:
An Efficient Classification Algorithm Based on T-Cells Maturation with No Parameters. Int. J. Comput. Intell. Appl. 16(4): 1750024:1-1750024:16 (2017) - [j3]Jinyin Chen, Jin Shi, Wenyao Du, Yangyang Wu:
基于MB-RRT*的无人机航迹规划算法研究 (MB-RRT* Based Navigation Planning Algorithm for UAV). 计算机科学 44(8): 198-206 (2017) - [j2]Jinyin Chen, Yuwei Li, Wenyao Du:
基于EB-RRT*的无人机航迹规划算法研究 (UAV Navigation Algorithm Research Based on EB-RRT*). 计算机科学 44(Z11): 72-79 (2017) - 2016
- [j1]Jin-Yin Chen, Hui-Hao He:
A fast density-based data stream clustering algorithm with cluster centers self-determined for mixed data. Inf. Sci. 345: 271-293 (2016) - 2011
- [c6]Jinyin Chen, Dongyong Yang, Zhilin Feng:
T-Cell detector maturation algorithm based on cooperative co-evolution GA. ICNC 2011: 2295-2299 - 2010
- [c5]Jinyin Chen, Dongyong Yang:
Constrained handling in multi-objective optimization based on Quantum-behaved particle swarm optimization. ICNC 2010: 3887-3891
2000 – 2009
- 2009
- [c4]Jinyin Chen, Dongyong Yang:
Intrusion Detection System Platform Based on Light-Weighted Hybrid Artificial Immune Algorithms. ICNC (4) 2009: 319-324 - 2007
- [c3]Dongyong Yang, Jinyin Chen, Naofumi Matsumoto:
Self-Adaptive Crossover Particle Swarm Optimizer for Multi-dimension Functions Optimization. ICNC (4) 2007: 160-164 - [c2]Dongyong Yang, Jinyin Chen, Naofumi Matsumoto:
Particle Swarm Optimization with Adaptive Parameters. SNPD (1) 2007: 616-621 - 2006
- [c1]Dongyong Yang, Jinyin Chen, Naofumi Matsumoto, Yuzo Yamane:
Multi-robot Path Planning Based on Cooperative Co-evolution and Adaptive CGA. IAT 2006: 547-550
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint