Xiaojun Chen
Orcid: 0000-0003-0362-847XAffiliations:
- Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
According to our database1,
Xiaojun Chen
authored at least 70 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the International Joint Conference on Neural Networks, 2024
Proceedings of the Workshop Proceedings of the 53rd International Conference on Parallel Processing, 2024
DualCOS: Query-Efficient Data-Free Model Stealing with Dual Clone Networks and Optimal Samples.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024
Comet: Communication-Efficient Batch Secure Three-Party Neural Network Inference with Client-Aiding.
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the Computer Vision - ECCV 2024, 2024
2023
Neural Networks, November, 2023
IEEE Trans. Inf. Forensics Secur., 2023
Meteor: Improved Secure 3-Party Neural Network Inference with Reducing Online Communication Costs.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Research Track, 2023
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2023, 2023
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023
2022
Proceedings of the PRICAI 2022: Trends in Artificial Intelligence, 2022
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022
ACTSS: Input Detection Defense against Backdoor Attacks via Activation Subset Scanning.
Proceedings of the International Joint Conference on Neural Networks, 2022
Proceedings of the International Joint Conference on Neural Networks, 2022
Proceedings of the International Joint Conference on Neural Networks, 2022
Proceedings of the 26th International Conference on Pattern Recognition, 2022
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2022, 2022
Multi-initial-Center Federated Learning with Data Distribution Similarity-Aware Constraint.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022
An Efficient Federated Convolutional Neural Network Scheme with Differential Privacy.
Proceedings of the Emerging Information Security and Applications, 2022
DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible Perturbation and Latent Representation Constraints.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022
2021
FLOD: Oblivious Defender for Private Byzantine-Robust Federated Learning with Dishonest-Majority.
IACR Cryptol. ePrint Arch., 2021
A Differential Privacy Collaborative Deep Learning Algorithm in Pervasive Edge Computing Environment.
Proceedings of the 20th IEEE International Conference on Trust, 2021
Enhancing Label Representations with Relational Inductive Bias Constraint for Fine-Grained Entity Typing.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021
2020
Proceedings of the Natural Language Processing and Chinese Computing, 2020
Proceedings of the MultiMedia Modeling - 26th International Conference, 2020
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the 32nd IEEE International Conference on Tools with Artificial Intelligence, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
A Shared-Word Sensitive Sequence-to-Sequence Features Extractor for Sentences Matching.
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Proceedings of the International Joint Conference on Neural Networks, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
A More Efficient Private Set Intersection Protocol Based on Random OT and Balance Hash.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
2018
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
Proceedings of the 24th International Conference on Pattern Recognition, 2018
Proceedings of the Computational Science - ICCS 2018, 2018
Attention-Based RNN Model for Joint Extraction of Intent and Word Slot Based on a Tagging Strategy.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2018, 2018
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2018
2017
Proceedings of the Information Security - 20th International Conference, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
2016
Proceedings of the 2016 IEEE Military Communications Conference, 2016
2015
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015
2014
Proceedings of the Information Security - 17th International Conference, 2014
Proceedings of the Trustworthy Computing and Services - International Conference, 2014
Proceedings of the IEEE Symposium on Computers and Communications, 2014
A practical real-time authentication system with Identity Tracking based on mouse dynamics.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Proceedings of the Web Technologies and Applications, 2014
Proceedings of the Web Technologies and Applications, 2014
2013
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013
2012
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
2007
Parallelizing Protocol Processing on SMT Processor Efficiently: A FSM Decomposition Approach.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007