Shanqing Yu

Orcid: 0000-0001-5170-8082

According to our database1, Shanqing Yu authored at least 48 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
DeepInsight: Topology Changes Assisting Detection of Adversarial Samples on Graphs.
IEEE Trans. Comput. Soc. Syst., February, 2024

Null Model-Based Data Augmentation for Graph Classification.
IEEE Trans. Netw. Sci. Eng., 2024

A Federated Parameter Aggregation Method for Node Classification Tasks with Different Graph Network Structures.
CoRR, 2024

General2Specialized LLMs Translation for E-commerce.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024

2023
Agent manipulator: Stealthy strategy attacks on deep reinforcement learning.
Appl. Intell., May, 2023

An Improved Differential Evolution Framework Using Network Topology Information for Critical Nodes Detection.
IEEE Trans. Comput. Soc. Syst., April, 2023

Graph-Fraudster: Adversarial Attacks on Graph Neural Network-Based Vertical Federated Learning.
IEEE Trans. Comput. Soc. Syst., April, 2023

EMD and VMD Empowered Deep Learning for Radio Modulation Recognition.
IEEE Trans. Cogn. Commun. Netw., February, 2023

RobustECD: Enhancement of Network Structure for Robust Community Detection.
IEEE Trans. Knowl. Data Eng., 2023

MONA: An Efficient and Scalable Strategy for Targeted k-Nodes Collapse.
CoRR, 2023

PathMLP: Smooth Path Towards High-order Homophily.
CoRR, 2023

Subgraph Networks Based Contrastive Learning.
CoRR, 2023

Single Node Injection Label Specificity Attack on Graph Neural Networks via Reinforcement Learning.
CoRR, 2023

Boosting Signal Modulation Few-Shot Learning with Pre-Transformation.
Proceedings of the IEEE International Conference on Acoustics, 2023

2022
A Novel Spatiotemporal Behavior-Enabled Random Walk Strategy on Online Social Platforms.
IEEE Trans. Comput. Soc. Syst., 2022

The Robustness of Graph k-Shell Structure Under Adversarial Attacks.
IEEE Trans. Circuits Syst. II Express Briefs, 2022

ROBY: Evaluating the adversarial robustness of a deep model by its decision boundaries.
Inf. Sci., 2022

Discover Important Paths in the Knowledge Graph Based on Dynamic Relation Confidence.
CoRR, 2022

Dual-channel Early Warning Framework for Ethereum Ponzi Schemes.
CoRR, 2022

SubGraph Networks based Entity Alignment for Cross-lingual Knowledge Graph.
CoRR, 2022

Mixing Signals: Data Augmentation Approach for Deep Learning Based Modulation Recognition.
CoRR, 2022

Cross Cryptocurrency Relationship Mining for Bitcoin Price Prediction.
Proceedings of the Blockchain and Trustworthy Systems - 4th International Conference, 2022

2021
Network Embedding Attack: An Euclidean Distance Based Method.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

Corrections to "M-Evolve: Structural-Mapping-Based Data Augmentation for Graph Classification".
IEEE Trans. Netw. Sci. Eng., 2021

M-Evolve: Structural-Mapping-Based Data Augmentation for Graph Classification.
IEEE Trans. Netw. Sci. Eng., 2021

Target Defense Against Link-Prediction-Based Attacks via Evolutionary Perturbations.
IEEE Trans. Knowl. Data Eng., 2021

MGA: Momentum Gradient Attack on Network.
IEEE Trans. Comput. Soc. Syst., 2021

Graph-Fraudster: Adversarial Attacks on Graph Neural Network Based Vertical Federated Learning.
CoRR, 2021

DeepInsight: Interpretability Assisting Detection of Adversarial Samples on Graphs.
CoRR, 2021

Ponzi Scheme Detection in EthereumTransaction Network.
CoRR, 2021

Ponzi Scheme Detection in Ethereum Transaction Network.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021

Temporal-Amount Snapshot MultiGraph for Ethereum Transaction Tracking.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021

TSGN: Transaction Subgraph Networks for Identifying Ethereum Phishing Accounts.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021

Identity Inference on Blockchain Using Graph Neural Network.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021

2020
Unsupervised Euclidean Distance Attack on Network Embedding.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

2019
N2VSCDNNR: A Local Recommender System Based on Node2vec and Rich Information Network.
IEEE Trans. Comput. Soc. Syst., 2019

GA-Based Q-Attack on Community Detection.
IEEE Trans. Comput. Soc. Syst., 2019

Adversarial Enhancement for Community Detection in Complex Networks.
CoRR, 2019

Unsupervised Euclidean Distance Attack on Network Embedding.
CoRR, 2019

2018
Target Defense Against Link-Prediction-Based Attacks via Evolutionary Perturbations.
CoRR, 2018

2017
Improving the robustness of GNP-PCA using the multiagent system.
Appl. Soft Comput., 2017

2013
Genetic Network Programming Based Class Association Rule Mining with Attributes Importance for Large Attributes Set.
Proceedings of the IEEE International Conference on Systems, 2013

Usage of Frequently Used Node in Variable Size Genetic Network Programming.
Proceedings of the IEEE International Conference on Systems, 2013

2012
Q value-based Dynamic Programming with SARSA Learning for real time route guidance in large scale road networks.
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012

2011
Dynamic traffic management model for real world road networks.
Proceedings of the IEEE International Conference on Systems, 2011

2010
Various temperature parameter control methods in Q value-based Dynamic Programming with Boltzmann Distribution.
Proceedings of the IEEE International Conference on Systems, 2010

2009
Multi-Routes Algorithm using Temperature Control of Boltzmann Distribution in Q value-based Dynamic Programming.
Proceedings of the IEEE International Conference on Systems, 2009

2008
LRLW-LSI: An Improved Latent Semantic Indexing (LSI) Text Classifier.
Proceedings of the Rough Sets and Knowledge Technology, Third International Conference, 2008


  Loading...