Jinyin Chen

Orcid: 0000-0002-7153-2755

According to our database1, Jinyin Chen authored at least 136 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
AIR: Threats of Adversarial Attacks on Deep Learning-Based Information Recovery.
IEEE Trans. Wirel. Commun., September, 2024

RobustRMC: Robustness Interpretable Deep Neural Network for Radio Modulation Classification.
IEEE Trans. Cogn. Commun. Netw., August, 2024

TEGDetector: A Phishing Detector That Knows Evolving Transaction Behaviors.
IEEE Trans. Comput. Soc. Syst., June, 2024

Link-Backdoor: Backdoor Attack on Link Prediction via Node Injection.
IEEE Trans. Comput. Soc. Syst., April, 2024

Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via Motifs.
IEEE Trans. Comput. Soc. Syst., April, 2024

Robust explanations for graph neural network with neuron explanation component.
Inf. Sci., January, 2024

AdvCheck: Characterizing adversarial examples via local gradient checking.
Comput. Secur., January, 2024

Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction.
IEEE Trans. Netw. Sci. Eng., 2024

An Empirical Evaluation of the Data Leakage in Federated Graph Learning.
IEEE Trans. Netw. Sci. Eng., 2024

EdgePro: Edge Deep Learning Model Protection via Neuron Authorization.
IEEE Trans. Dependable Secur. Comput., 2024

A Miss Is as Good as A Mile: Metamorphic Testing for Deep Learning Operators.
Proc. ACM Softw. Eng., 2024

Rethinking the defense against free-rider attack from the perspective of model weight evolving frequency.
Inf. Sci., 2024

GUARD: Role-playing to Generate Natural-language Jailbreakings to Test Guideline Adherence of Large Language Models.
CoRR, 2024

Like teacher, like pupil: Transferring backdoors via feature-based knowledge distillation.
Comput. Secur., 2024

Robust knowledge distillation based on feature variance against backdoored teacher model.
Appl. Soft Comput., 2024

Attacks, Defenses and Testing for Deep Learning
Springer, ISBN: 978-981-97-0424-8, 2024

2023
GONE: A generic O(1) NoisE layer for protecting privacy of deep neural networks.
Comput. Secur., December, 2023

FedRight: An effective model copyright protection for federated learning.
Comput. Secur., December, 2023

Graphfool: Targeted Label Adversarial Attack on Graph Embedding.
IEEE Trans. Comput. Soc. Syst., October, 2023

PoE: Poisoning Enhancement Through Label Smoothing in Federated Learning.
IEEE Trans. Circuits Syst. II Express Briefs, August, 2023

Excitement surfeited turns to errors: Deep learning testing framework based on excitable neurons.
Inf. Sci., August, 2023

EGC<sup>2</sup>: Enhanced graph classification with easy graph compression.
Inf. Sci., June, 2023

Generative adversarial network-assisted image classification for imbalanced tire X-ray defect detection.
Trans. Inst. Meas. Control, May, 2023

Agent manipulator: Stealthy strategy attacks on deep reinforcement learning.
Appl. Intell., May, 2023

An Improved Differential Evolution Framework Using Network Topology Information for Critical Nodes Detection.
IEEE Trans. Comput. Soc. Syst., April, 2023

Graph-Fraudster: Adversarial Attacks on Graph Neural Network-Based Vertical Federated Learning.
IEEE Trans. Comput. Soc. Syst., April, 2023

Evil vs evil: using adversarial examples to against backdoor attack in federated learning.
Multim. Syst., April, 2023

GAIL-PT: An intelligent penetration testing framework with generative adversarial imitation learning.
Comput. Secur., March, 2023

Is Multi-Modal Necessarily Better? Robustness Evaluation of Multi-Modal Fake News Detection.
IEEE Trans. Netw. Sci. Eng., 2023

Time-Aware Gradient Attack on Dynamic Network Link Prediction.
IEEE Trans. Knowl. Data Eng., 2023

CTL-DIFF: Control Information Diffusion in Social Network by Structure Optimization.
IEEE Trans. Comput. Soc. Syst., 2023

EditShield: Protecting Unauthorized Image Editing by Instruction-guided Diffusion Models.
CoRR, 2023

AdvCheck: Characterizing Adversarial Examples via Local Gradient Checking.
CoRR, 2023

Edge Deep Learning Model Protection via Neuron Authorization.
CoRR, 2023

One4All: Manipulate one agent to poison the cooperative multi-agent reinforcement learning.
Comput. Secur., 2023

CertPri: Certifiable Prioritization for Deep Neural Networks via Movement Cost in Feature Space.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

An in-depth analysis of robustness and accuracy of recommendation systems.
Proceedings of the IEEE International Conference on Data Mining, 2023

2022
GraphAttacker: A General Multi-Task Graph Attack Framework.
IEEE Trans. Netw. Sci. Eng., 2022

GRIP-GAN: An Attack-Free Defense Through General Robust Inverse Perturbation.
IEEE Trans. Dependable Secur. Comput., 2022

Time-Series Snapshot Network for Partner Recommendation: A Case Study on OSS.
IEEE Trans. Comput. Soc. Syst., 2022

ROBY: Evaluating the adversarial robustness of a deep model by its decision boundaries.
Inf. Sci., 2022

Salient feature extractor for adversarial defense on deep neural networks.
Inf. Sci., 2022

ActGraph: Prioritization of Test Cases Based on Deep Neural Network Activation Graph.
CoRR, 2022

Rethinking the Defense Against Free-rider Attack From the Perspective of Model Weight Evolving Frequency.
CoRR, 2022

GAIL-PT: A Generic Intelligent Penetration Testing Framework with Generative Adversarial Imitation Learning.
CoRR, 2022

DeepSensor: Deep Learning Testing Framework Based on Neuron Sensitivity.
CoRR, 2022

GC-LSTM: graph convolution embedded LSTM for dynamic network link prediction.
Appl. Intell., 2022

Label Inference Attacks Against Vertical Federated Learning.
Proceedings of the 31st USENIX Security Symposium, 2022

NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Understanding the Dynamics of DNNs Using Graph Modularity.
Proceedings of the Computer Vision - ECCV 2022, 2022

Adversarial Attack Detection Based on Example Semantics and Model Activation Features.
Proceedings of the 5th International Conference on Data Science and Information Technology, 2022

Attack and Defense Methods for Graph Vertical Federation Learning.
Proceedings of the 5th International Conference on Computer Science and Software Engineering, 2022

Improving Robustness of Language Models from a Geometry-aware Perspective.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2022, 2022

2021
Network Embedding Attack: An Euclidean Distance Based Method.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

E-LSTM-D: A Deep Learning Framework for Dynamic Network Link Prediction.
IEEE Trans. Syst. Man Cybern. Syst., 2021

Smoothing Adversarial Training for GNN.
IEEE Trans. Comput. Soc. Syst., 2021

MGA: Momentum Gradient Attack on Network.
IEEE Trans. Comput. Soc. Syst., 2021

Multiscale Evolutionary Perturbation Attack on Community Detection.
IEEE Trans. Comput. Soc. Syst., 2021

Visualizing Deep Learning-Based Radio Modulation Classifier.
IEEE Trans. Cogn. Commun. Netw., 2021

DeepPoison: Feature Transfer Based Stealthy Poisoning Attack for DNNs.
IEEE Trans. Circuits Syst. II Express Briefs, 2021

Anti-Interpolation: An Attack Facilitator Hiding Adversaries Into Images.
IEEE Trans. Circuits Syst. II Express Briefs, 2021

FEM: Feature extraction and mapping for radio modulation classification.
Phys. Commun., 2021

ACT-Detector: Adaptive channel transformation-based light-weighted detector for adversarial attacks.
Inf. Sci., 2021

MASS: Multi-task anthropomorphic speech synthesis framework.
Comput. Speech Lang., 2021

TEGDetector: A Phishing Detector that Knows Evolving Transaction Behaviors.
CoRR, 2021

Graph-Fraudster: Adversarial Attacks on Graph Neural Network Based Vertical Federated Learning.
CoRR, 2021

Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction.
CoRR, 2021

Blockchain Phishing Scam Detection via Multi-channel Graph Classification.
CoRR, 2021

EGC2: Enhanced Graph Classification with Easy Graph Compression.
CoRR, 2021

Salient Feature Extractor for Adversarial Defense on Deep Neural Networks.
CoRR, 2021

Graphfool: Targeted Label Adversarial Attack on Graph Embedding.
CoRR, 2021

GraphAttacker: A General Multi-Task GraphAttack Framework.
CoRR, 2021

DeepPoison: Feature Transfer Based Stealthy Poisoning Attack.
CoRR, 2021

FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique.
Comput. Secur., 2021

A fast detector generation algorithm for negative selection.
Appl. Intell., 2021

Blockchain Phishing Scam Detection via Multi-channel Graph Classification.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021

Unsupervised Face Recognition Algorithm based on Fast Density Clustering Algorithm.
Proceedings of the AISS 2021: 3rd International Conference on Advanced Information Science and System, Sanya, China, November 26, 2021

2020
Link Prediction Adversarial Attack Via Iterative Gradient Attack.
IEEE Trans. Comput. Soc. Syst., 2020

Open DNN Box by Power Side-Channel Attack.
IEEE Trans. Circuits Syst., 2020

MAG-GAN: Massive attack generator via GAN.
Inf. Sci., 2020

Customizable text generation via conditional text generative adversarial network.
Neurocomputing, 2020

Collective transfer learning for defect prediction.
Neurocomputing, 2020

A novel clustering algorithm based on the deviation factor model.
Int. J. Comput. Sci. Eng., 2020

A novel radius adaptive based on center-optimized hybrid detector generation algorithm.
IEEE CAA J. Autom. Sinica, 2020

ROBY: Evaluating the Robustness of a Deep Model by its Decision Boundaries.
CoRR, 2020

Time-Series Snapshot Network as A New Model for Role Recommendation in OSS.
CoRR, 2020

RCA-SOC: A novel adversarial defense by refocusing on critical areas and strengthening object contours.
Comput. Secur., 2020

Attention Mechanism Based Adversarial Attack Against Deep Reinforcement Learning.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

Adaptive Adversarial Attack on Graph Embedding via GAN.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Feature Explainable Deep Classification for Signal Modulation Recognition.
Proceedings of the 46th Annual Conference of the IEEE Industrial Electronics Society, 2020

Software visualization and deep transfer learning for effective software defect prediction.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Unsupervised Euclidean Distance Attack on Network Embedding.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

DAS-AST: Defending Against Model Stealing Attacks Based on Adaptive Softmax Transformation.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

Hyper-Substructure Enhanced Link Predictor.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

SPA: Stealthy Poisoning Attack.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

Adversarial Detection on Graph Structured Data.
Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020

2019
PSO-ANE: Adaptive Network Embedding With Particle Swarm Optimization.
IEEE Trans. Comput. Soc. Syst., 2019

N2VSCDNNR: A Local Recommender System Based on Node2vec and Rich Information Network.
IEEE Trans. Comput. Soc. Syst., 2019

GA-Based Q-Attack on Community Detection.
IEEE Trans. Comput. Soc. Syst., 2019

基于深度学习的智能教学系统的设计与研究 (Design and Research on Intelligent Teaching System Based on Deep Learning).
计算机科学, 2019

基于双循环图的虚假评论检测算法 (Double Cycle Graph Based Fraud Review Detection Algorithm).
计算机科学, 2019

Unsupervised Euclidean Distance Attack on Network Embedding.
CoRR, 2019

Can Adversarial Network Attack be Defended?
CoRR, 2019

E-LSTM-D: A Deep Learning Framework for Dynamic Network Link Prediction.
CoRR, 2019

POBA-GA: Perturbation optimized black-box adversarial attacks via genetic algorithm.
Comput. Secur., 2019

DGEPN-GCEN2V: a new framework for mining GGI and its application in biomarker detection.
Sci. China Inf. Sci., 2019

FGCH: a fast and grid based clustering algorithm for hybrid data stream.
Appl. Intell., 2019

Robustness Analysis of Bipartite Task Assignment Networks: A Case Study in Hospital Logistics System.
IEEE Access, 2019

Multiview Transfer Learning for Software Defect Prediction.
IEEE Access, 2019

DAD-MCNN: DDoS Attack Detection via Multi-channel CNN.
Proceedings of the 2019 11th International Conference on Machine Learning and Computing, 2019

Out-of-store Object Detection Based on Deep Learning.
Proceedings of the 2019 11th International Conference on Machine Learning and Computing, 2019

DGFE-VG: Dynamic Gene Feature Extraction via Visibility Graph.
Proceedings of the third International Conference on Medical and Health Informatics 2019, 2019

Invisible Poisoning: Highly Stealthy Targeted Poisoning Attack.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2018
Link Weight Prediction Using Supervised Learning Methods and Its Application to Yelp Layered Network.
IEEE Trans. Knowl. Data Eng., 2018

基于粒子群算法的支持向量机的参数优化 (Parameters Optimization for SVM Based on Particle Swarm Algorithm).
计算机科学, 2018

基于自适应免疫计算的网络攻击检测研究 (Research on Network Attack Detection Based on Self-adaptive Immune Computing).
计算机科学, 2018

基于MB-RRT*的无人机多点航迹规划算法研究 (Research on UAV Multi-point Navigation Algorithm Based on MB-RRT*).
计算机科学, 2018

基于在线学习行为分析的个性化学习推荐 (Personal Learning Recommendation Based on Online Learning Behavior Analysis).
计算机科学, 2018

A novel image segmentation method based on fast density clustering algorithm.
Eng. Appl. Artif. Intell., 2018

GC-LSTM: Graph Convolution Embedded LSTM for Dynamic Link Prediction.
CoRR, 2018

FineFool: Fine Object Contour Attack via Attention.
CoRR, 2018

Link Prediction Adversarial Attack.
CoRR, 2018

Fast Gradient Attack on Network Embedding.
CoRR, 2018

DOE-AND-SCA: A Novel SCA Based on DNN With Optimal Eigenvectors and Automatic Cluster Number Determination.
IEEE Access, 2018

2017
基于MB-RRT*的无人机航迹规划算法研究 (MB-RRT* Based Navigation Planning Algorithm for UAV).
计算机科学, 2017

基于EB-RRT*的无人机航迹规划算法研究 (UAV Navigation Algorithm Research Based on EB-RRT*).
计算机科学, 2017

An Efficient Classification Algorithm Based on T-Cells Maturation with No Parameters.
Int. J. Comput. Intell. Appl., 2017

Improving the robustness of GNP-PCA using the multiagent system.
Appl. Soft Comput., 2017

A novel cluster center fast determination clustering algorithm.
Appl. Soft Comput., 2017

2016
A fast density-based data stream clustering algorithm with cluster centers self-determined for mixed data.
Inf. Sci., 2016

2011
T-Cell detector maturation algorithm based on cooperative co-evolution GA.
Proceedings of the Seventh International Conference on Natural Computation, 2011

2010
Constrained handling in multi-objective optimization based on Quantum-behaved particle swarm optimization.
Proceedings of the Sixth International Conference on Natural Computation, 2010

2009
Intrusion Detection System Platform Based on Light-Weighted Hybrid Artificial Immune Algorithms.
Proceedings of the Fifth International Conference on Natural Computation, 2009

2007
Particle Swarm Optimization with Adaptive Parameters.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Self-Adaptive Crossover Particle Swarm Optimizer for Multi-dimension Functions Optimization.
Proceedings of the Third International Conference on Natural Computation, 2007

2006
Multi-robot Path Planning Based on Cooperative Co-evolution and Adaptive CGA.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006


  Loading...