Xiaojun Chen

Orcid: 0000-0003-0362-847X

Affiliations:
  • Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China


According to our database1, Xiaojun Chen authored at least 70 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Federated Learning with Limited Node Labels.
CoRR, 2024

STMS: An Out-Of-Distribution Model Stealing Method Based on Causality.
Proceedings of the International Joint Conference on Neural Networks, 2024

Graph Federated Learning with Center Moment Constraints for Node Classification.
Proceedings of the Workshop Proceedings of the 53rd International Conference on Parallel Processing, 2024

DualCOS: Query-Efficient Data-Free Model Stealing with Dual Clone Networks and Optimal Samples.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

Comet: Communication-Efficient Batch Secure Three-Party Neural Network Inference with Client-Aiding.
Proceedings of the IEEE International Conference on Communications, 2024

Roger: A Round Optimized GPU-Friendly Secure Inference Framework.
Proceedings of the IEEE International Conference on Communications, 2024

CipherDM: Secure Three-Party Inference for Diffusion Model Sampling.
Proceedings of the Computer Vision - ECCV 2024, 2024

2023
Generalized heterophily graph data augmentation for node classification.
Neural Networks, November, 2023

FlexBNN: Fast Private Binary Neural Network Inference With Flexible Bit-Width.
IEEE Trans. Inf. Forensics Secur., 2023

Meteor: Improved Secure 3-Party Neural Network Inference with Reducing Online Communication Costs.
IACR Cryptol. ePrint Arch., 2023

Practical and General Backdoor Attacks Against Vertical Federated Learning.
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Research Track, 2023

Lightweight Reference-Less Summary Quality Evaluation via Key Feature Extraction.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2023, 2023

Unsupervised Graph Structure-Assisted Personalized Federated Learning.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

2022
Improved Network Pruning via Similarity-Based Regularization.
Proceedings of the PRICAI 2022: Trends in Artificial Intelligence, 2022

PrUE: Distilling Knowledge from Sparse Teacher Networks.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022

ACTSS: Input Detection Defense against Backdoor Attacks via Activation Subset Scanning.
Proceedings of the International Joint Conference on Neural Networks, 2022

Rethinking the Feature Iteration Process of Graph Convolution Networks.
Proceedings of the International Joint Conference on Neural Networks, 2022

KAFNN: A Knowledge Augmentation Framework to Graph Neural Networks.
Proceedings of the International Joint Conference on Neural Networks, 2022

NEWSFARM: A Large-Scale Chinese Corpus of Long News Summarization.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

CLTS+: A New Chinese Long Text Summarization Dataset with Abstractive Summaries.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2022, 2022

Multi-initial-Center Federated Learning with Data Distribution Similarity-Aware Constraint.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022

An Efficient Federated Convolutional Neural Network Scheme with Differential Privacy.
Proceedings of the Emerging Information Security and Applications, 2022

DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible Perturbation and Latent Representation Constraints.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Noise Suppression with Label Graph in Distantly Supervised Relation Extraction.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

2021
Robust node embedding against graph structural perturbations.
Inf. Sci., 2021

FLOD: Oblivious Defender for Private Byzantine-Robust Federated Learning with Dishonest-Majority.
IACR Cryptol. ePrint Arch., 2021

Efficient Byzantine-Resilient Stochastic Gradient Desce.
CoRR, 2021

A Differential Privacy Collaborative Deep Learning Algorithm in Pervasive Edge Computing Environment.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Enhancing Label Representations with Relational Inductive Bias Constraint for Fine-Grained Entity Typing.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

2020
EaSTFLy: Efficient and secure ternary federated learning.
Comput. Secur., 2020

CLTS: A New Chinese Long Text Summarization Dataset.
Proceedings of the Natural Language Processing and Chinese Computing, 2020

Generate Images with Obfuscated Attributes for Private Image Classification.
Proceedings of the MultiMedia Modeling - 26th International Conference, 2020

Improving Abstractive Text Summarization with History Aggregation.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Improving Abstractive Summarization with Iterative Representation.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

SoMem: A Self-optimizing Memory Network for Distributed Person Re-identification.
Proceedings of the 32nd IEEE International Conference on Tools with Artificial Intelligence, 2020

An Efficient 3-Party Framework for Privacy-Preserving Neural Network Inference.
Proceedings of the Computer Security - ESORICS 2020, 2020

A Shared-Word Sensitive Sequence-to-Sequence Features Extractor for Sentences Matching.
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020

2019
Privacy-Preserving Distributed Machine Learning based on Secret Sharing.
IACR Cryptol. ePrint Arch., 2019

A coarse-grained password model with memorable unit-based recurrent neural networks.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Abstractive Text Summarization with Multi-Head Attention.
Proceedings of the International Joint Conference on Neural Networks, 2019

Privacy-Preserving Distributed Machine Learning Based on Secret Sharing.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

A More Efficient Private Set Intersection Protocol Based on Random OT and Balance Hash.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

QOBST: An Adaptable Matching Model for Content-Based Pub/Sub Systems.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2018
An On-the-Fly Scheduling Strategy for Distributed Stream Processing Platform.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Improve Word Mover's Distance with Part-of-Speech Tagging.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

Automatic Web News Extraction Based on DS Theory Considering Content Topics.
Proceedings of the Computational Science - ICCS 2018, 2018

Attention-Based RNN Model for Joint Extraction of Intent and Word Slot Based on a Tagging Strategy.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2018, 2018

Cloud-MOM: A Content-Based Real-Time Message-Oriented Middleware for Cloud.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

A Survey on Collaborative Deep Learning and Privacy-Preserving.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

An In-depth Study of Digits in Passwords for Chinese Websites.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Efficient and Private Set Intersection of Human Genomes.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2018

2017
Improving Password Guessing Using Byte Pair Encoding.
Proceedings of the Information Security - 20th International Conference, 2017

Efficient and Scalable Privacy-Preserving Similar Document Detection.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Implementation and Evaluation of Different Parallel Designs of AES Using CUDA.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
Memory chunking analysis of numerical password for Chinese websites.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

2015
Towards misdirected email detection based on multi-attributes.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

2014
Winnowing Double Structure for Wildcard Query in Payload Attribution.
Proceedings of the Information Security - 17th International Conference, 2014

CAS: Content Attribution System for Network Forensics.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

Towards misdirected email detection for preventing information leakage.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

A practical real-time authentication system with Identity Tracking based on mouse dynamics.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Detecting Insider Threat Based on Document Access Behavior Analysis.
Proceedings of the Web Technologies and Applications, 2014

Winnowing Multihashing Structure with Wildcard Query.
Proceedings of the Web Technologies and Applications, 2014

2013
A Multi-Level Analysis Framework in Network Security Situation Awareness.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

A Three-Dimensional Evaluation Model for Network Management System.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

A Multiple Watermarking Algorithm for Texts Mixed Chinese and English.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

A Bigram based Real Time DNS Tunnel Detection Approach.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

Data Stolen Trojan Detection based on Network Behaviors.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

A Continuous Re-Authentication Approach Using Ensemble Learning.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

2012
An Intent-Driven Masquerader Detection Framework Based on Data Fusion.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

2007
Parallelizing Protocol Processing on SMT Processor Efficiently: A FSM Decomposition Approach.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007


  Loading...