Xingyuan Chen
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2025
Neurocomputing, 2025
2024
IEEE Trans. Intell. Veh., May, 2024
Expert Syst. Appl., 2024
Impact of topography and climate on post-fire vegetation recovery across different burn severity and land cover types through random forest.
Ecol. Informatics, 2024
Adversarial robust decision-making under uncertainty learning and dynamic ensemble selection.
Eng. Appl. Artif. Intell., 2024
Improved weak convergence for the long time simulation of Mean-field Langevin equations.
CoRR, 2024
SAM4UDASS: When SAM Meets Unsupervised Domain Adaptive Semantic Segmentation in Intelligent Vehicles.
CoRR, 2024
Comput. Secur., 2024
IEEE Access, 2024
Proceedings of the IEEE International Conference on Real-time Computing and Robotics, 2024
Proceedings of the 19th Conference on Ph.D Research in Microelectronics and Electronics, 2024
Proceedings of the PRICAI 2024: Trends in Artificial Intelligence, 2024
Proceedings of the Knowledge Science, Engineering and Management, 2024
2023
Soft Comput., November, 2023
Adversarial robustness in deep neural networks based on variable attributes of the stochastic ensemble model.
Frontiers Neurorobotics, June, 2023
An adversarial transferability metric based on SVD of Jacobians to disentangle the correlation with robustness.
Appl. Intell., May, 2023
Int. J. Comput. Commun. Control, April, 2023
Tactics2D: A Multi-agent Reinforcement Learning Environment for Driving Decision-making.
CoRR, 2023
An iterative method for Helmholtz boundary value problems arising in wave propagation.
CoRR, 2023
Dynamic ensemble selection based on Deep Neural Network Uncertainty Estimation for Adversarial Robustness.
CoRR, 2023
Wellposedness, exponential ergodicity and numerical approximation of fully super-linear McKean-Vlasov SDEs and associated particle systems.
CoRR, 2023
A Near Real-Time Big Data Provenance Generation Method Based on the Conjoint Analysis of Heterogeneous Logs.
IEEE Access, 2023
Proceedings of the 4th International Conference on Machine Learning and Computer Application, 2023
2022
Impact of Shifts in Vegetation Phenology on the Carbon Balance of a Semiarid Sagebrush Ecosystem.
Remote. Sens., December, 2022
Guidelines for Publicly Archiving Terrestrial Model Data to Enhance Usability, Intercomparison, and Synthesis.
Data Sci. J., 2022
Euler simulation of interacting particle systems and McKean-Vlasov SDEs with fully superlinear growth drifts in space and interaction.
CoRR, 2022
Application of Machine Learning Methods in Inferring Surface Water Groundwater Exchanges using High Temporal Resolution Temperature Measurements.
CoRR, 2022
A flexible split-step scheme for solving McKean-Vlasov stochastic differential equations.
Appl. Math. Comput., 2022
FSAFlow: Lightweight and Fast Dynamic Path Tracking and Control for Privacy Protection on Android Using Hybrid Analysis with State-Reduction Strategy.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the Chinese Lexical Semantics - 23rd Workshop, 2022
Proceedings of the 18th International Conference on Computational Intelligence and Security, 2022
2021
Knowl. Based Syst., 2021
Future Internet, 2021
Coupling surface flow with high-performance subsurface reactive flow and transport code PFLOTRAN.
Environ. Model. Softw., 2021
DART-PFLOTRAN: An ensemble-based data assimilation system for estimating subsurface flow and transport model parameters.
Environ. Model. Softw., 2021
Comput. Speech Lang., 2021
Dynamic Defense Approach for Adversarial Robustness in Deep Neural Networks via Stochastic Ensemble Smoothed Model.
CoRR, 2021
IEEE Access, 2021
Proceedings of the 17th International Conference on Computational Intelligence and Security CIS 2021, 2021
Proceedings of the 17th International Conference on Computational Intelligence and Security CIS 2021, 2021
2020
An Adaptive Authenticated Data Structure With Privacy-Preserving for Big Data Stream in Cloud.
IEEE Trans. Inf. Forensics Secur., 2020
A Discriminator Improves Unconditional Text Generation without Updating the Generator.
CoRR, 2020
IEEE Access, 2020
The errors analysis of natural language generation - A case study of Topic-to-Essay generation.
Proceedings of the 16th International Conference on Computational Intelligence and Security, 2020
2019
Reducing Security Risks of Suspicious Data and Codes Through a Novel Dynamic Defense Model.
IEEE Trans. Inf. Forensics Secur., 2019
Proceedings of the International Conference on Asian Language Processing, 2019
2018
Time Synchronization Algorithm for Wireless Sensor Networks Based on Frequency Offset Estimation.
Int. J. Online Eng., 2018
Quantum computing cryptography: Unveiling cryptographic Boolean functions with quantum annealing.
CoRR, 2018
Comput. Secur., 2018
Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing.
IEEE Access, 2018
2017
Dynamic authenticated data structures with access control for outsourcing data stream.
IET Inf. Secur., 2017
PFLOTRAN-E4D: A parallel open source PFLOTRAN module for simulating time-lapse electrical resistivity data.
Comput. Geosci., 2017
2016
计算机科学, 2016
CUDA-Based Parallel Implementation of IBM Word Alignment Algorithm for Statistical Machine Translation.
Proceedings of the 17th International Conference on Parallel and Distributed Computing, 2016
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016
Proceedings of the Chinese Lexical Semantics - 17th Workshop, 2016
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016
2015
计算机科学, 2015
计算机科学, 2015
Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2015
Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2015
Proceedings of the International Conference on Computational Science, 2015
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015
2014
Environ. Model. Softw., 2014
Proceedings of the 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), Warsaw, Poland, August 11-14, 2014, 2014
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014
2013
An Efficient Elliptic Curve Discrete Logarithm based Trapdoor Hash Scheme without Key Exposure.
J. Comput., 2013
Numerical Modelling of Viscoelastic Fluid-Structure Interaction and Its Application for a Valveless Micropump.
Proceedings of the Numerical Mathematics and Advanced Applications - ENUMATH 2013, 2013
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
2012
Comput. Secur., 2012
2011
Proceedings of the 4th International Symposium on Computational Intelligence and Design, 2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
2008
A Novel Trust Collecting Mechanism Based on Publish/Subscribe Scheme in Grid Computing.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007