default search action
Haibin Zheng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [b1]Jinyin Chen, Ximin Zhang, Haibin Zheng:
Attacks, Defenses and Testing for Deep Learning. Springer 2024, ISBN 978-981-97-0424-8, pp. 5-399 - [j57]Jinyin Chen, Xiaoming Zhao, Haibin Zheng, Xiao Li, Sheng Xiang, Haifeng Guo:
Robust knowledge distillation based on feature variance against backdoored teacher model. Appl. Soft Comput. 163: 111907 (2024) - [j56]Ruoxi Chen, Haibo Jin, Jinyin Chen, Haibin Zheng, Shilian Zheng, Xiaoniu Yang, Xing Yang:
AdvCheck: Characterizing adversarial examples via local gradient checking. Comput. Secur. 136: 103540 (2024) - [j55]Jinyin Chen, Zhiqi Cao, Ruoxi Chen, Haibin Zheng, Xiao Li, Qi Xuan, Xing Yang:
Like teacher, like pupil: Transferring backdoors via feature-based knowledge distillation. Comput. Secur. 146: 104041 (2024) - [j54]Jinyin Chen, Guohan Huang, Haibin Zheng, Hang Du, Jian Zhang:
Robust explanations for graph neural network with neuron explanation component. Inf. Sci. 654: 119785 (2024) - [j53]Jinyin Chen, Mingjun Li, Tao Liu, Haibin Zheng, Hang Du, Yao Cheng:
Rethinking the defense against free-rider attack from the perspective of model weight evolving frequency. Inf. Sci. 668: 120527 (2024) - [j52]Jinyin Chen, Chengyu Jia, Yunjie Yan, Jie Ge, Haibin Zheng, Yao Cheng:
A Miss Is as Good as A Mile: Metamorphic Testing for Deep Learning Operators. Proc. ACM Softw. Eng. 1(FSE): 2005-2027 (2024) - [j51]Jinyin Chen, Danxin Liao, Shilian Zheng, Linhui Ye, Chenyu Jia, Haibin Zheng, Sheng Xiang:
RobustRMC: Robustness Interpretable Deep Neural Network for Radio Modulation Classification. IEEE Trans. Cogn. Commun. Netw. 10(4): 1218-1240 (2024) - [j50]Haoran Xie, Yujue Wang, Yong Ding, Changsong Yang, Haibin Zheng, Bo Qin:
Verifiable Federated Learning With Privacy-Preserving Data Aggregation for Consumer Electronics. IEEE Trans. Consumer Electron. 70(1): 2696-2707 (2024) - [j49]Haibin Zheng, Haiyang Xiong, Haonan Ma, Guohan Huang, Jinyin Chen:
Link-Backdoor: Backdoor Attack on Link Prediction via Node Injection. IEEE Trans. Comput. Soc. Syst. 11(2): 1816-1831 (2024) - [j48]Haibin Zheng, Haiyang Xiong, Jinyin Chen, Haonan Ma, Guohan Huang:
Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via Motifs. IEEE Trans. Comput. Soc. Syst. 11(2): 2479-2493 (2024) - [j47]Haibin Zheng, Minying Ma, Haonan Ma, Jinyin Chen, Haiyang Xiong, Zhijun Yang:
TEGDetector: A Phishing Detector That Knows Evolving Transaction Behaviors. IEEE Trans. Comput. Soc. Syst. 11(3): 3988-4000 (2024) - [j46]Jinyin Chen, Haibin Zheng, Tao Liu, Jiawei Liu, Yao Cheng, Xuhong Zhang, Shouling Ji:
EdgePro: Edge Deep Learning Model Protection via Neuron Authorization. IEEE Trans. Dependable Secur. Comput. 21(5): 4967-4981 (2024) - [j45]Mingzhe Zhai, Yizhong Liu, Qianhong Wu, Bo Qin, Haibin Zheng, Xiaopeng Dai, Zhenyang Ding, Willy Susilo:
Accountable Secret Committee Election and Anonymous Sharding Blockchain Consensus. IEEE Trans. Inf. Forensics Secur. 19: 9158-9172 (2024) - [j44]Jinyin Chen, Haiyang Xiong, Haibin Zheng, Jian Zhang, Yi Liu:
Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction. IEEE Trans. Netw. Sci. Eng. 11(1): 525-542 (2024) - [j43]Jinyin Chen, Minying Ma, Haonan Ma, Haibin Zheng, Jian Zhang:
An Empirical Evaluation of the Data Leakage in Federated Graph Learning. IEEE Trans. Netw. Sci. Eng. 11(2): 1605-1618 (2024) - [j42]Zhenwei Guo, Bo Qin, Zhenyu Guan, Yujue Wang, Haibin Zheng, Qianhong Wu:
A High-Efficiency and Incentive-Compatible Peer-to-Peer Energy Trading Mechanism. IEEE Trans. Smart Grid 15(1): 1075-1088 (2024) - [j41]Jinyin Chen, Jie Ge, Shilian Zheng, Linhui Ye, Haibin Zheng, Weiguo Shen, Keqiang Yue, Xiaoniu Yang:
AIR: Threats of Adversarial Attacks on Deep Learning-Based Information Recovery. IEEE Trans. Wirel. Commun. 23(9): 10698-10711 (2024) - [i25]Jinyin Chen, Xiaoming Zhao, Haibin Zheng, Xiao Li, Sheng Xiang, Haifeng Guo:
Robust Knowledge Distillation Based on Feature Variance Against Backdoored Teacher Model. CoRR abs/2406.03409 (2024) - 2023
- [j40]Jinyin Chen, Xueke Wang, Yan Zhang, Haibin Zheng, Shanqing Yu, Liang Bao:
Agent manipulator: Stealthy strategy attacks on deep reinforcement learning. Appl. Intell. 53(10): 12831-12858 (2023) - [j39]Haibin Zheng, Xiaohao Li, Jinyin Chen, Jianfeng Dong, Yan Zhang, Changting Lin:
One4All: Manipulate one agent to poison the cooperative multi-agent reinforcement learning. Comput. Secur. 124: 103005 (2023) - [j38]Jinyin Chen, Shulong Hu, Haibin Zheng, Chang-you Xing, Guomin Zhang:
GAIL-PT: An intelligent penetration testing framework with generative adversarial imitation learning. Comput. Secur. 126: 103055 (2023) - [j37]Haibin Zheng, Jinyin Chen, Wenchang Shangguan, Zhaoyan Ming, Xing Yang, Zhijun Yang:
GONE: A generic O(1) NoisE layer for protecting privacy of deep neural networks. Comput. Secur. 135: 103471 (2023) - [j36]Jinyin Chen, Mingjun Li, Yao Cheng, Haibin Zheng:
FedRight: An effective model copyright protection for federated learning. Comput. Secur. 135: 103504 (2023) - [j35]Jinyin Chen, Haiyang Xiong, Haibin Zheng, Dunjie Zhang, Jian Zhang, Mingwei Jia, Yi Liu:
EGC2: Enhanced graph classification with easy graph compression. Inf. Sci. 629: 376-397 (2023) - [j34]Haibo Jin, Ruoxi Chen, Haibin Zheng, Jinyin Chen, Yao Cheng, Yue Yu, Tieming Chen, Xianglong Liu:
Excitement surfeited turns to errors: Deep learning testing framework based on excitable neurons. Inf. Sci. 637: 118936 (2023) - [j33]Baodong Wen, Yujue Wang, Yong Ding, Haibin Zheng, Bo Qin, Changsong Yang:
Security and privacy protection technologies in securing blockchain applications. Inf. Sci. 645: 119322 (2023) - [j32]Tao Liu, Mingjun Li, Haibin Zheng, Zhaoyan Ming, Jinyin Chen:
Evil vs evil: using adversarial examples to against backdoor attack in federated learning. Multim. Syst. 29(2): 553-568 (2023) - [j31]Weiyou Liang, Yujue Wang, Yong Ding, Haibin Zheng, Hai Liang, Huiyong Wang:
An efficient blockchain-based anonymous authentication and supervision system. Peer Peer Netw. Appl. 16(5): 2492-2511 (2023) - [j30]Haibin Zheng, Tao Liu, Rongchang Li, Jinyin Chen:
PoE: Poisoning Enhancement Through Label Smoothing in Federated Learning. IEEE Trans. Circuits Syst. II Express Briefs 70(8): 3129-3133 (2023) - [j29]Jinyin Chen, Guohan Huang, Haibin Zheng, Shanqing Yu, Wenrong Jiang, Chen Cui:
Graph-Fraudster: Adversarial Attacks on Graph Neural Network-Based Vertical Federated Learning. IEEE Trans. Comput. Soc. Syst. 10(2): 492-506 (2023) - [j28]Jinyin Chen, Guohan Huang, Haibin Zheng, Dunjie Zhang, Xiang Lin:
Graphfool: Targeted Label Adversarial Attack on Graph Embedding. IEEE Trans. Comput. Soc. Syst. 10(5): 2523-2535 (2023) - [j27]Jinyin Chen, Chengyu Jia, Haibin Zheng, Ruoxi Chen, Chenbo Fu:
Is Multi-Modal Necessarily Better? Robustness Evaluation of Multi-Modal Fake News Detection. IEEE Trans. Netw. Sci. Eng. 10(6): 3144-3158 (2023) - [c25]Baodong Wen, Yujue Wang, Yong Ding, Haibin Zheng, Hai Liang, Changsong Yang, Jinyuan Liu:
Privacy-Preserving Blockchain Supervision with Responsibility Tracking. CollaborateCom (1) 2023: 243-262 - [c24]Yang Yang, Bingyu Li, Shihong Xiong, Bo Qin, Yan Zhu, Haibin Zheng, Qianhong Wu:
IKE: Threshold Key Escrow Service with Intermediary Encryption. ICA3PP (3) 2023: 463-475 - [c23]Haibin Zheng, Jinyin Chen, Haibo Jin:
CertPri: Certifiable Prioritization for Deep Neural Networks via Movement Cost in Feature Space. ASE 2023: 1-13 - [i24]Jinyin Chen, Mingjun Li, Yao Cheng, Haibin Zheng:
FedRight: An Effective Model Copyright Protection for Federated Learning. CoRR abs/2303.10399 (2023) - [i23]Jinyin Chen, Haibin Zheng, Tao Liu, Rongchang Li, Yao Cheng, Xuhong Zhang, Shouling Ji:
Edge Deep Learning Model Protection via Neuron Authorization. CoRR abs/2303.12397 (2023) - [i22]Ruoxi Chen, Haibo Jin, Jinyin Chen, Haibin Zheng:
AdvCheck: Characterizing Adversarial Examples via Local Gradient Checking. CoRR abs/2303.18131 (2023) - [i21]Haibin Zheng, Jinyin Chen, Haibo Jin:
CertPri: Certifiable Prioritization for Deep Neural Networks via Movement Cost in Feature Space. CoRR abs/2307.09375 (2023) - [i20]Jinyin Chen, Jie Ge, Shilian Zheng, Linhui Ye, Haibin Zheng, Weiguo Shen, Keqiang Yue, Xiaoniu Yang:
AIR: Threats of Adversarial Attacks on Deep Learning-Based Information Recovery. CoRR abs/2309.16706 (2023) - 2022
- [j26]Haibo Jin, Jinyin Chen, Haibin Zheng, Zhen Wang, Jun Xiao, Shanqing Yu, Zhaoyan Ming:
ROBY: Evaluating the adversarial robustness of a deep model by its decision boundaries. Inf. Sci. 587: 97-122 (2022) - [j25]Ruoxi Chen, Jinyin Chen, Haibin Zheng, Qi Xuan, Zhaoyan Ming, Wenrong Jiang, Chen Cui:
Salient feature extractor for adversarial defense on deep neural networks. Inf. Sci. 600: 118-143 (2022) - [j24]Yang Yang, Shangbin Han, Ping Xie, Yan Zhu, Zhenyang Ding, Shengjie Hou, Shicheng Xu, Haibin Zheng:
Implementation and Optimization of Zero-Knowledge Proof Circuit Based on Hash Function SM3. Sensors 22(16): 5951 (2022) - [j23]Haibin Zheng, Jinyin Chen, Hang Du, Weipeng Zhu, Shouling Ji, Xuhong Zhang:
GRIP-GAN: An Attack-Free Defense Through General Robust Inverse Perturbation. IEEE Trans. Dependable Secur. Comput. 19(6): 4204-4224 (2022) - [c22]Xinzhe Huang, Yong Ding, Haibin Zheng, Decun Luo, Yujue Wang, Junfu Wu, Luyi Zhang:
A Privacy-Preserving Credit Bank Supervision Framework Based on Redactable Blockchain. BlockSys 2022: 18-30 - [c21]Xinyi Xie, Haibin Zheng, Hu Li, Ling Pang, Jinyin Chen:
Attack and Defense Methods for Graph Vertical Federation Learning. CSSE 2022: 175-179 - [c20]Weiyou Liang, Yujue Wang, Yong Ding, Haibin Zheng, Hai Liang, Huiyong Wang:
An efficient anonymous authentication and supervision system based on blockchain. DSC 2022: 306-313 - [c19]Jinyin Chen, Tianle Yu, Changan Wu, Haibin Zheng, Wenhong Zhao, Ling Pang, Hu Li:
Adversarial Attack Detection Based on Example Semantics and Model Activation Features. DSIT 2022: 1-6 - [c18]Haibin Zheng, Zhiqing Chen, Tianyu Du, Xuhong Zhang, Yao Cheng, Shouling Ji, Jingyi Wang, Yue Yu, Jinyin Chen:
NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification. ICSE 2022: 1519-1531 - [i19]Haibo Jin, Ruoxi Chen, Haibin Zheng, Jinyin Chen, Zhenguang Liu, Qi Xuan, Yue Yu, Yao Cheng:
DeepSensor: Deep Learning Testing Framework Based on Neuron Sensitivity. CoRR abs/2202.07464 (2022) - [i18]Jinyin Chen, Shulong Hu, Haibin Zheng, Chang-you Xing, Guomin Zhang:
GAIL-PT: A Generic Intelligent Penetration Testing Framework with Generative Adversarial Imitation Learning. CoRR abs/2204.01975 (2022) - [i17]Jinyin Chen, Mingjun Li, Tao Liu, Haibin Zheng, Yao Cheng, Chang-Ting Lin:
Rethinking the Defense Against Free-rider Attack From the Perspective of Model Weight Evolving Frequency. CoRR abs/2206.05406 (2022) - [i16]Jinyin Chen, Chengyu Jia, Haibin Zheng, Ruoxi Chen, Chenbo Fu:
Is Multi-Modal Necessarily Better? Robustness Evaluation of Multi-modal Fake News Detection. CoRR abs/2206.08788 (2022) - [i15]Haibin Zheng, Haiyang Xiong, Haonan Ma, Guohan Huang, Jinyin Chen:
Link-Backdoor: Backdoor Attack on Link Prediction via Node Injection. CoRR abs/2208.06776 (2022) - [i14]Haibin Zheng, Haiyang Xiong, Jinyin Chen, Haonan Ma, Guohan Huang:
Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via Motifs. CoRR abs/2210.13710 (2022) - [i13]Jinyin Chen, Jie Ge, Haibin Zheng:
ActGraph: Prioritization of Test Cases Based on Deep Neural Network Activation Graph. CoRR abs/2211.00273 (2022) - 2021
- [j22]Jinyin Chen, Haibin Zheng, Hui Xiong, Ruoxi Chen, Tianyu Du, Zhen Hong, Shouling Ji:
FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique. Comput. Secur. 104: 102220 (2021) - [j21]Jinyin Chen, Haibin Zheng, Wenchang Shangguan, Liangying Liu, Shouling Ji:
ACT-Detector: Adaptive channel transformation-based light-weighted detector for adversarial attacks. Inf. Sci. 564: 163-192 (2021) - [j20]Huili Wang, Wenping Ma, Fuyang Deng, Haibin Zheng, Qianhong Wu:
Dynamic threshold ECDSA signature and application to asset custody in blockchain. J. Inf. Secur. Appl. 61: 102805 (2021) - [j19]Jinyin Chen, Hui Cui, Shenghuan Miao, Changan Wu, Haibin Zheng, Shilian Zheng, Liang Huang, Qi Xuan:
FEM: Feature extraction and mapping for radio modulation classification. Phys. Commun. 45: 101279 (2021) - [j18]Jinyin Chen, Longyuan Zhang, Haibin Zheng, Xueke Wang, Zhaoyan Ming:
DeepPoison: Feature Transfer Based Stealthy Poisoning Attack for DNNs. IEEE Trans. Circuits Syst. II Express Briefs 68(7): 2618-2622 (2021) - [j17]Jinyin Chen, Hui Xiong, Haibin Zheng, Zhaoyan Ming, Yi Liu:
Anti-Interpolation: An Attack Facilitator Hiding Adversaries Into Images. IEEE Trans. Circuits Syst. II Express Briefs 68(7): 2670-2674 (2021) - [j16]Jinyin Chen, Yixian Chen, Haibin Zheng, Shijing Shen, Shanqing Yu, Dan Zhang, Qi Xuan:
MGA: Momentum Gradient Attack on Network. IEEE Trans. Comput. Soc. Syst. 8(1): 99-109 (2021) - [j15]Jinyin Chen, Xiang Lin, Hui Xiong, Yangyang Wu, Haibin Zheng, Qi Xuan:
Smoothing Adversarial Training for GNN. IEEE Trans. Comput. Soc. Syst. 8(3): 618-629 (2021) - [c17]Guodong Jiang, Jingjing Zhang, Jinyin Chen, Haibin Zheng, Zhiqing Chen, Liang Bao:
Unsupervised Face Recognition Algorithm based on Fast Density Clustering Algorithm. AISS 2021: 65:1-65:6 - [c16]Ya-Nan Cao, Yujue Wang, Yong Ding, Haibin Zheng, Zhenyu Guan, Huiyong Wang:
A PUF-based Lightweight Authenticated Metering Data Collection Scheme with Privacy Protection in Smart Grid. ISPA/BDCloud/SocialCom/SustainCom 2021: 876-883 - [i12]Jinyin Chen, Longyuan Zhang, Haibin Zheng, Xueke Wang, Zhaoyan Ming:
DeepPoison: Feature Transfer Based Stealthy Poisoning Attack. CoRR abs/2101.02562 (2021) - [i11]Jinyin Chen, Ruoxi Chen, Haibin Zheng, Zhaoyan Ming, Wenrong Jiang, Chen Cui:
Salient Feature Extractor for Adversarial Defense on Deep Neural Networks. CoRR abs/2105.06807 (2021) - [i10]Jinyin Chen, Haiyang Xiong, Haibin Zheng, Jian Zhang, Guodong Jiang, Yi Liu:
Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction. CoRR abs/2110.03875 (2021) - [i9]Haibin Zheng, Zhiqing Chen, Tianyu Du, Xuhong Zhang, Yao Cheng, Shouling Ji, Jingyi Wang, Yue Yu, Jinyin Chen:
NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification. CoRR abs/2112.13214 (2021) - 2020
- [j14]Haibin Zheng, Qianhong Wu, Jan Xie, Zhenyu Guan, Bo Qin, Zhiqiang Gu:
An organization-friendly blockchain system. Comput. Secur. 88 (2020) - [j13]Jinyin Chen, Haibin Zheng, Ruoxi Chen, Hui Xiong:
RCA-SOC: A novel adversarial defense by refocusing on critical areas and strengthening object contours. Comput. Secur. 96: 101916 (2020) - [j12]Jinyin Chen, Yangyang Wu, Chengyu Jia, Haibin Zheng, Guohan Huang:
Customizable text generation via conditional text generative adversarial network. Neurocomputing 416: 125-135 (2020) - [j11]Jin-Yin Chen, Haibin Zheng, Hui Xiong, Shijing Shen, Mengmeng Su:
MAG-GAN: Massive attack generator via GAN. Inf. Sci. 536: 67-90 (2020) - [c15]Jinyin Chen, Longyuan Zhang, Haibin Zheng, Qi Xuan:
SPA: Stealthy Poisoning Attack. CIAT 2020: 303-309 - [c14]Jinyin Chen, Shenghuan Miao, Haibin Zheng, Shilian Zheng:
Feature Explainable Deep Classification for Signal Modulation Recognition. IECON 2020: 3543-3548 - [c13]Jinyin Chen, Xueke Wang, Yan Zhang, Haibin Zheng, Shouling Ji:
Attention Mechanism Based Adversarial Attack Against Deep Reinforcement Learning. SpaCCS 2020: 19-43 - [i8]Jinyin Chen, Yixian Chen, Haibin Zheng, Shijing Shen, Shanqing Yu, Dan Zhang, Qi Xuan:
MGA: Momentum Gradient Attack on Network. CoRR abs/2002.11320 (2020) - [i7]Jinyin Chen, Zhen Wang, Haibin Zheng, Jun Xiao, Zhaoyan Ming:
ROBY: Evaluating the Robustness of a Deep Model by its Decision Boundaries. CoRR abs/2012.10282 (2020)
2010 – 2019
- 2019
- [j10]Jinyin Chen, Haibin Zheng, Hui Xiong, Yangyang Wu, Xiang Lin, Shiyan Ying, Qi Xuan:
DGEPN-GCEN2V: a new framework for mining GGI and its application in biomarker detection. Sci. China Inf. Sci. 62(9): 199104:1-199104:3 (2019) - [j9]Haibin Zheng, Qianhong Wu, Zhenyu Guan, Bo Qin, Shuangyu He, Jianwei Liu:
Achieving liability in anonymous communication: Auditing and tracing. Comput. Commun. 145: 1-13 (2019) - [j8]Jinyin Chen, Mengmeng Su, Shijing Shen, Hui Xiong, Haibin Zheng:
POBA-GA: Perturbation optimized black-box adversarial attacks via genetic algorithm. Comput. Secur. 85: 89-106 (2019) - [j7]Jinyin Chen, Yangyang Wu, Lu Fan, Xiang Lin, Haibin Zheng, Shanqing Yu, Qi Xuan:
N2VSCDNNR: A Local Recommender System Based on Node2vec and Rich Information Network. IEEE Trans. Comput. Soc. Syst. 6(3): 456-466 (2019) - [j6]Jinyin Chen, Yangyang Wu, Xuanheng Xu, Haibin Zheng, Zhongyuan Ruan, Qi Xuan:
PSO-ANE: Adaptive Network Embedding With Particle Swarm Optimization. IEEE Trans. Comput. Soc. Syst. 6(4): 649-659 (2019) - [c12]Jinyin Chen, Haibin Zheng, Mengmeng Su, Tianyu Du, Chang-Ting Lin, Shouling Ji:
Invisible Poisoning: Highly Stealthy Targeted Poisoning Attack. Inscrypt 2019: 173-198 - [c11]Jinyin Chen, Zhen Wang, Haibin Zheng, Liangying Liu, Ziling Zhu, Shiyan Ying, Yitao Wei:
DGFE-VG: Dynamic Gene Feature Extraction via Visibility Graph. ICMHI 2019: 119-124 - [c10]Jinyin Chen, Zhen Wang, Kai-hui Cheng, Haibin Zheng, An-tao Pan:
Out-of-store Object Detection Based on Deep Learning. ICMLC 2019: 423-428 - [c9]Jinyin Chen, Yitao Yang, Keke Hu, Haibin Zheng, Zhen Wang:
DAD-MCNN: DDoS Attack Detection via Multi-channel CNN. ICMLC 2019: 484-488 - [c8]Huili Wang, Wenping Ma, Haibin Zheng, Qianhong Wu:
Distributed Secure Storage System Based on Blockchain and TPA. NSS 2019: 255-271 - [c7]Huili Wang, Wenping Ma, Haibin Zheng, Zhi Liang, Qianhong Wu:
Privacy-Preserving Sequential Data Publishing. NSS 2019: 596-614 - [c6]Zhenyu Guan, Hanzheng Lyu, Haibin Zheng, Dawei Li, Jianwei Liu:
Distributed Audit System of SDN Controller Based on Blockchain. SmartBlock 2019: 21-31 - [i6]Jinyin Chen, Yangyang Wu, Lu Fan, Xiang Lin, Haibin Zheng, Shanqing Yu, Qi Xuan:
N2VSCDNNR: A Local Recommender System Based on Node2vec and Rich Information Network. CoRR abs/1904.12605 (2019) - [i5]Jinyin Chen, Mengmeng Su, Shijing Shen, Hui Xiong, Haibin Zheng:
POBA-GA: Perturbation Optimized Black-Box Adversarial Attacks via Genetic Algorithm. CoRR abs/1906.03181 (2019) - 2018
- [j5]Shuangyu He, Qianhong Wu, Xizhao Luo, Zhi Liang, Dawei Li, Hanwen Feng, Haibin Zheng, Yanan Li:
A Social-Network-Based Cryptocurrency Wallet-Management Scheme. IEEE Access 6: 7654-7663 (2018) - [j4]Jinyin Chen, Haibin Zheng, Xiang Lin, Yangyang Wu, Mengmeng Su:
A novel image segmentation method based on fast density clustering algorithm. Eng. Appl. Artif. Intell. 73: 92-110 (2018) - [j3]Jinyin Chen, Hui Xiong, Haibin Zheng:
基于粒子群算法的支持向量机的参数优化 (Parameters Optimization for SVM Based on Particle Swarm Algorithm). 计算机科学 45(6): 197-203 (2018) - [j2]Jinyin Chen, Hang Fang, Xiang Lin, Haibin Zheng, Dongyong Yang, Xiao Zhou:
基于在线学习行为分析的个性化学习推荐 (Personal Learning Recommendation Based on Online Learning Behavior Analysis). 计算机科学 45(11A): 422-426 (2018) - [c5]Haibin Zheng, Qianhong Wu, Bo Qin, Lin Zhong, Shuangyu He, Jianwei Liu:
Linkable Group Signature for Auditing Anonymous Communication. ACISP 2018: 304-321 - [c4]Lin Zhong, Qianhong Wu, Bo Qin, Haibin Zheng, Jianwei Liu:
Auditable Hierarchy-Private Public-Key Encryption. ACISP 2018: 322-340 - [i4]Jinyin Chen, Yangyang Wu, Xuanheng Xu, Yixian Chen, Haibin Zheng, Qi Xuan:
Fast Gradient Attack on Network Embedding. CoRR abs/1809.02797 (2018) - [i3]Jinyin Chen, Ziqiang Shi, Yangyang Wu, Xuanheng Xu, Haibin Zheng:
Link Prediction Adversarial Attack. CoRR abs/1810.01110 (2018) - [i2]Jinyin Chen, Haibin Zheng, Hui Xiong, Mengmeng Su:
FineFool: Fine Object Contour Attack via Attention. CoRR abs/1812.01713 (2018) - [i1]Jinyin Chen, Xuanheng Xu, Yangyang Wu, Haibin Zheng:
GC-LSTM: Graph Convolution Embedded LSTM for Dynamic Link Prediction. CoRR abs/1812.04206 (2018) - 2017
- [c3]Haibin Zheng, Xin Wang, Zebin Xu:
Study on hydrodynamic performance and CFD simulation of AUV. ICIA 2017: 24-29 - 2016
- [j1]Haibin Zheng, Jing Qin, Jiankun Hu, Qianhong Wu:
Threshold attribute-based signcryption and its application to authenticated key agreement. Secur. Commun. Networks 9(18): 4914-4923 (2016) - 2015
- [c2]Haibin Zheng, Jing Qin, Jiankun Hu, Qianhong Wu:
Threshold Attribute-Based Signcryption in Standard Model. CSCloud 2015: 187-193 - 2014
- [c1]May Takada, Masaki Yamada, Yuji Kakutani, Ken Sodeyama, Shingo Hane, Takahiro Fujishiro, Haibin Zheng, Sima Yahyavi, Yoshinori Furuno, Hiroshi Watanabe:
An Experimental Analysis on Latency Improvement of Cloud-Based Fleet Management System. UCC 2014: 505-506
Coauthor Index
aka: Jin-Yin Chen
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint