Jinyin Chen
Orcid: 0000-0002-7153-2755
According to our database1,
Jinyin Chen
authored at least 136 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Wirel. Commun., September, 2024
RobustRMC: Robustness Interpretable Deep Neural Network for Radio Modulation Classification.
IEEE Trans. Cogn. Commun. Netw., August, 2024
IEEE Trans. Comput. Soc. Syst., June, 2024
IEEE Trans. Comput. Soc. Syst., April, 2024
IEEE Trans. Comput. Soc. Syst., April, 2024
Inf. Sci., January, 2024
Comput. Secur., January, 2024
IEEE Trans. Netw. Sci. Eng., 2024
IEEE Trans. Netw. Sci. Eng., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Proc. ACM Softw. Eng., 2024
Rethinking the defense against free-rider attack from the perspective of model weight evolving frequency.
Inf. Sci., 2024
GUARD: Role-playing to Generate Natural-language Jailbreakings to Test Guideline Adherence of Large Language Models.
CoRR, 2024
Like teacher, like pupil: Transferring backdoors via feature-based knowledge distillation.
Comput. Secur., 2024
Robust knowledge distillation based on feature variance against backdoored teacher model.
Appl. Soft Comput., 2024
Springer, ISBN: 978-981-97-0424-8, 2024
2023
Comput. Secur., December, 2023
Comput. Secur., December, 2023
IEEE Trans. Comput. Soc. Syst., October, 2023
IEEE Trans. Circuits Syst. II Express Briefs, August, 2023
Excitement surfeited turns to errors: Deep learning testing framework based on excitable neurons.
Inf. Sci., August, 2023
Inf. Sci., June, 2023
Generative adversarial network-assisted image classification for imbalanced tire X-ray defect detection.
Trans. Inst. Meas. Control, May, 2023
Appl. Intell., May, 2023
An Improved Differential Evolution Framework Using Network Topology Information for Critical Nodes Detection.
IEEE Trans. Comput. Soc. Syst., April, 2023
Graph-Fraudster: Adversarial Attacks on Graph Neural Network-Based Vertical Federated Learning.
IEEE Trans. Comput. Soc. Syst., April, 2023
Evil vs evil: using adversarial examples to against backdoor attack in federated learning.
Multim. Syst., April, 2023
GAIL-PT: An intelligent penetration testing framework with generative adversarial imitation learning.
Comput. Secur., March, 2023
Is Multi-Modal Necessarily Better? Robustness Evaluation of Multi-Modal Fake News Detection.
IEEE Trans. Netw. Sci. Eng., 2023
IEEE Trans. Knowl. Data Eng., 2023
IEEE Trans. Comput. Soc. Syst., 2023
EditShield: Protecting Unauthorized Image Editing by Instruction-guided Diffusion Models.
CoRR, 2023
CoRR, 2023
One4All: Manipulate one agent to poison the cooperative multi-agent reinforcement learning.
Comput. Secur., 2023
CertPri: Certifiable Prioritization for Deep Neural Networks via Movement Cost in Feature Space.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Proceedings of the IEEE International Conference on Data Mining, 2023
2022
IEEE Trans. Netw. Sci. Eng., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Comput. Soc. Syst., 2022
ROBY: Evaluating the adversarial robustness of a deep model by its decision boundaries.
Inf. Sci., 2022
Inf. Sci., 2022
ActGraph: Prioritization of Test Cases Based on Deep Neural Network Activation Graph.
CoRR, 2022
Rethinking the Defense Against Free-rider Attack From the Perspective of Model Weight Evolving Frequency.
CoRR, 2022
GAIL-PT: A Generic Intelligent Penetration Testing Framework with Generative Adversarial Imitation Learning.
CoRR, 2022
Appl. Intell., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Proceedings of the Computer Vision - ECCV 2022, 2022
Adversarial Attack Detection Based on Example Semantics and Model Activation Features.
Proceedings of the 5th International Conference on Data Science and Information Technology, 2022
Proceedings of the 5th International Conference on Computer Science and Software Engineering, 2022
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2022, 2022
2021
Proceedings of the MDATA: A New Knowledge Representation Model, 2021
IEEE Trans. Syst. Man Cybern. Syst., 2021
IEEE Trans. Comput. Soc. Syst., 2021
IEEE Trans. Cogn. Commun. Netw., 2021
IEEE Trans. Circuits Syst. II Express Briefs, 2021
IEEE Trans. Circuits Syst. II Express Briefs, 2021
Phys. Commun., 2021
ACT-Detector: Adaptive channel transformation-based light-weighted detector for adversarial attacks.
Inf. Sci., 2021
Comput. Speech Lang., 2021
CoRR, 2021
Graph-Fraudster: Adversarial Attacks on Graph Neural Network Based Vertical Federated Learning.
CoRR, 2021
CoRR, 2021
CoRR, 2021
FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique.
Comput. Secur., 2021
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021
Proceedings of the AISS 2021: 3rd International Conference on Advanced Information Science and System, Sanya, China, November 26, 2021
2020
IEEE Trans. Comput. Soc. Syst., 2020
Neurocomputing, 2020
Int. J. Comput. Sci. Eng., 2020
A novel radius adaptive based on center-optimized hybrid detector generation algorithm.
IEEE CAA J. Autom. Sinica, 2020
CoRR, 2020
CoRR, 2020
RCA-SOC: A novel adversarial defense by refocusing on critical areas and strengthening object contours.
Comput. Secur., 2020
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020
Proceedings of the 46th Annual Conference of the IEEE Industrial Electronics Society, 2020
Software visualization and deep transfer learning for effective software defect prediction.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020
DAS-AST: Defending Against Model Stealing Attacks Based on Adaptive Softmax Transformation.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020
Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020
2019
IEEE Trans. Comput. Soc. Syst., 2019
N2VSCDNNR: A Local Recommender System Based on Node2vec and Rich Information Network.
IEEE Trans. Comput. Soc. Syst., 2019
基于深度学习的智能教学系统的设计与研究 (Design and Research on Intelligent Teaching System Based on Deep Learning).
计算机科学, 2019
计算机科学, 2019
Comput. Secur., 2019
DGEPN-GCEN2V: a new framework for mining GGI and its application in biomarker detection.
Sci. China Inf. Sci., 2019
Appl. Intell., 2019
Robustness Analysis of Bipartite Task Assignment Networks: A Case Study in Hospital Logistics System.
IEEE Access, 2019
Proceedings of the 2019 11th International Conference on Machine Learning and Computing, 2019
Proceedings of the 2019 11th International Conference on Machine Learning and Computing, 2019
Proceedings of the third International Conference on Medical and Health Informatics 2019, 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
2018
Link Weight Prediction Using Supervised Learning Methods and Its Application to Yelp Layered Network.
IEEE Trans. Knowl. Data Eng., 2018
基于粒子群算法的支持向量机的参数优化 (Parameters Optimization for SVM Based on Particle Swarm Algorithm).
计算机科学, 2018
基于自适应免疫计算的网络攻击检测研究 (Research on Network Attack Detection Based on Self-adaptive Immune Computing).
计算机科学, 2018
基于MB-RRT*的无人机多点航迹规划算法研究 (Research on UAV Multi-point Navigation Algorithm Based on MB-RRT*).
计算机科学, 2018
基于在线学习行为分析的个性化学习推荐 (Personal Learning Recommendation Based on Online Learning Behavior Analysis).
计算机科学, 2018
Eng. Appl. Artif. Intell., 2018
DOE-AND-SCA: A Novel SCA Based on DNN With Optimal Eigenvectors and Automatic Cluster Number Determination.
IEEE Access, 2018
2017
计算机科学, 2017
计算机科学, 2017
An Efficient Classification Algorithm Based on T-Cells Maturation with No Parameters.
Int. J. Comput. Intell. Appl., 2017
Appl. Soft Comput., 2017
Appl. Soft Comput., 2017
2016
A fast density-based data stream clustering algorithm with cluster centers self-determined for mixed data.
Inf. Sci., 2016
2011
Proceedings of the Seventh International Conference on Natural Computation, 2011
2010
Constrained handling in multi-objective optimization based on Quantum-behaved particle swarm optimization.
Proceedings of the Sixth International Conference on Natural Computation, 2010
2009
Intrusion Detection System Platform Based on Light-Weighted Hybrid Artificial Immune Algorithms.
Proceedings of the Fifth International Conference on Natural Computation, 2009
2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Self-Adaptive Crossover Particle Swarm Optimizer for Multi-dimension Functions Optimization.
Proceedings of the Third International Conference on Natural Computation, 2007
2006
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006