Chenyi Zhang

Orcid: 0000-0002-3054-5883

According to our database1, Chenyi Zhang authored at least 77 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Discovering and Maintaining the Best $k$k in Core Decomposition.
IEEE Trans. Knowl. Data Eng., November, 2024

Call-Graph-Based Context-Sensitive Points-to Analysis for Java.
IEEE Trans. Reliab., June, 2024

Multi-Objective Self-Adaptive Particle Swarm Optimization for Large-Scale Feature Selection in Classification.
Int. J. Neural Syst., March, 2024

Comparisons Are All You Need for Optimizing Smooth Functions.
CoRR, 2024

A Confirmation Rule for the Ethereum Consensus Protocol.
CoRR, 2024

Learning Trimaps via Clicks for Image Matting.
CoRR, 2024

Beyond Recommender: An Exploratory Study of the Effects of Different AI Roles in AI-Assisted Decision Making.
CoRR, 2024

Quantum Non-Identical Mean Estimation: Efficient Algorithms and Fundamental Limits.
Proceedings of the 19th Conference on the Theory of Quantum Computation, 2024

Quantum Pseudoentanglement.
Proceedings of the 15th Innovations in Theoretical Computer Science Conference, 2024

Quantum Algorithms and Lower Bounds for Finite-Sum Optimization.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Near-Optimal Quantum Algorithm for Minimizing the Maximal Loss.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

Public-Key Pseudoentanglement and the Hardness of Learning Ground State Entanglement Structure.
Proceedings of the 39th Computational Complexity Conference, 2024

2023
An external attention-based feature ranker for large-scale feature selection.
Knowl. Based Syst., December, 2023

Adversarial Detection from Derived Models.
Int. J. Pattern Recognit. Artif. Intell., December, 2023

Monotonic learning with hypothesis evolution.
Inf. Sci., November, 2023

Quantum speedups for stochastic optimization.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Quantum Lower Bounds for Finding Stationary Points of Nonconvex Functions.
Proceedings of the International Conference on Machine Learning, 2023

2022
Quantum simulation of real-space dynamics.
Quantum, September, 2022

Modal characterisation of simulation relations in probabilistic concurrent games.
Sci. Comput. Program., 2022

A Uniform Framework for Anomaly Detection in Deep Neural Networks.
Neural Process. Lett., 2022

Robustness of Quantum Algorithms for Nonconvex Optimization.
CoRR, 2022

A Mask-Based Adversarial Defense Scheme.
Algorithms, 2022

Taint Trace Analysis For Java Web Applications.
Proceedings of the 34th International Conference on Software Engineering and Knowledge Engineering, 2022

Comparison Between Montelukast Sodium and Tiotropium Bromide for Asthma Treatment.
Proceedings of the 3rd International Symposium on Artificial Intelligence for Medicine Sciences, 2022

Parameter Sensitive Pointer Analysis for Java.
Proceedings of the 26th International Conference on Engineering of Complex Computer Systems, 2022

2021
Quantum algorithms for escaping from saddle points.
Quantum, 2021

Escape saddle points by a simple gradient-descent based algorithm.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

2020
Preface for the special issue of the 12th International Symposium on Theoretical Aspects of Software Engineering (TASE 2018).
Sci. Comput. Program., 2020

TFA: an efficient and precise virtual method call resolution for Java.
Formal Aspects Comput., 2020

Minimal consistent DFA from sample strings.
Acta Informatica, 2020

Characterising Probabilistic Alternating Simulation for Concurrent Games.
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2020

Finding the Best k in Core Decomposition: A Time and Space Optimal Solution.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Nontransitive Security Types for Coarse-grained Information Flow Control.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020

2019
A Relational Static Semantics for Call Graph Construction.
Proceedings of the Formal Methods and Software Engineering, 2019

2018
Reference Abstract Domains and Applications to String Analysis.
Fundam. Informaticae, 2018

2017
Combining String Abstract Domains for JavaScript Analysis: An Evaluation.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2017

Improving the Scalability of Automatic Linearizability Checking in SPIN.
Proceedings of the Formal Methods and Software Engineering, 2017

2016
Trip Recommendation Meets Real-World Constraints: POI Availability, Diversity, and Traveling Time Uncertainty.
ACM Trans. Inf. Syst., 2016

The complexity of synchronous notions of information flow security.
Theor. Comput. Sci., 2016

POI recommendation through cross-region collaborative filtering.
Knowl. Inf. Syst., 2016

2015
An I/O Efficient Approach for Detecting All Accepting Cycles.
IEEE Trans. Software Eng., 2015

Distributed cross-media multiple binary subspace learning.
Int. J. Multim. Inf. Retr., 2015

Personalized Trip Recommendation with POI Availability and Uncertain Traveling Time.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

Are Features Equally Representative? A Feature-Centric Recommendation.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Latent Tunnel Based Information Propagation in Microblog Networks.
Proceedings of the Social Network Analysis - Community Detection and Evolution, 2014

Latent Factor Transition for Dynamic Collaborative Filtering.
Proceedings of the 2014 SIAM International Conference on Data Mining, 2014

Cross-language bug localization.
Proceedings of the 22nd International Conference on Program Comprehension, 2014

Distributed Binary Subspace Learning on large-scale cross media data.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014

Content + Attributes: A Latent Factor Model for Recommending Scientific Papers in Heterogeneous Academic Networks.
Proceedings of the Advances in Information Retrieval, 2014

2013
Information flow in systems with schedulers, Part II: Refinement.
Theor. Comput. Sci., 2013

Information flow in systems with schedulers, Part I: Definitions.
Theor. Comput. Sci., 2013

Design and formal verification of a CEM protocol with transparent TTP.
Frontiers Comput. Sci., 2013

Path-Sensitive Data Flow Analysis Simplified.
Proceedings of the Formal Methods and Software Engineering, 2013

Information propagation in microblog networks.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
A trust-augmented voting scheme for collaborative privacy management.
J. Comput. Secur., 2012

Game-based verification of contract signing protocols with minimal messages.
Innov. Syst. Softw. Eng., 2012

Large scale microblog mining using distributed MB-LDA.
Proceedings of the 21st World Wide Web Conference, 2012

An Algorithm for Probabilistic Alternating Simulation.
Proceedings of the SOFSEM 2012: Theory and Practice of Computer Science, 2012

Translating flowcharts to non-deterministic languages.
Proceedings of the ACM SIGPLAN 2012 Workshop on Partial Evaluation and Program Manipulation, 2012

A Type and Effect System for Determinism in Multithreaded Programs.
Proceedings of the Programming Languages and Systems, 2012

Intransitive noninterference in nondeterministic systems.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Probabilistic Alternating-Time Temporal Logic of Incomplete Information and Synchronous Perfect Recall.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

2011
Conditional Information Flow Policies and Unwinding Relations.
Proceedings of the Trustworthy Global Computing - 6th International Symposium, 2011

2010
A comparison of semantic models for noninterference.
Theor. Comput. Sci., 2010

Verification of A Key Chain Based TTP Transparent CEM Protocol.
Proceedings of the 4th International Workshop on Harnessing Theories for Tool Support in Software, 2010

Unwinding Conditional Noninterference
CoRR, 2010

On Probabilistic Alternating Simulations.
Proceedings of the Theoretical Computer Science, 2010

Extending a Key-Chain Based Certified Email Protocol with Transparent TTP.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2009
Information flow security - models, verification and schedulers.
PhD thesis, 2009

How to Work with Honest but Curious Judges? (Preliminary Report)
Proceedings of the Proceedings 7th International Workshop on Security Issues in Concurrency, 2009

Game-Based Verification of Multi-Party Contract Signing Protocols.
Proceedings of the Formal Aspects in Security and Trust, 6th International Workshop, 2009

2008
User-Input Dependence Analysis via Graph Reachability.
Proceedings of the Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 2008

Information Flow in Systems with Schedulers.
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008

2007
Remarks on Testing Probabilistic Processes.
Proceedings of the Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin, 2007

Characterising Testing Preorders for Finite Probabilistic Processes.
Proceedings of the 22nd IEEE Symposium on Logic in Computer Science (LICS 2007), 2007

Scalar Outcomes Suffice for Finitary Probabilistic Testing.
Proceedings of the Programming Languages and Systems, 2007

2006
Algorithmic Verification of Noninterference Properties.
Proceedings of the Second International Workshop on Views on Designing Complex Architectures, 2006


  Loading...