Yaguan Qian

Orcid: 0000-0003-4056-9755

According to our database1, Yaguan Qian authored at least 44 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Neighbor-Enhanced Representation Learning for Link Prediction in Dynamic Heterogeneous Attributed Networks.
ACM Trans. Knowl. Discov. Data, September, 2024

Hierarchical Threshold Pruning Based on Uniform Response Criterion.
IEEE Trans. Neural Networks Learn. Syst., August, 2024

Resilient Sensor Data Dissemination to Mitigate Link Faults in IoT Networks With Long-Haul Optical Wires for Power Transmission Grids.
IEEE Internet Things J., May, 2024

Enhancing Transferability of Adversarial Examples Through Mixed-Frequency Inputs.
IEEE Trans. Inf. Forensics Secur., 2024

Robust filter pruning guided by deep frequency-features for edge intelligence.
Neurocomputing, 2024

Rethinking multi-spatial information for transferable adversarial attacks on speaker recognition systems.
CAAI Trans. Intell. Technol., 2024

Adversarial perturbation denoising utilizing common characteristics in deep feature space.
Appl. Intell., 2024

Towards Query-Efficient Decision-Based Adversarial Attacks Through Frequency Domain.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

2023
Adversarial training in logit space against tiny perturbations.
Multim. Syst., December, 2023

Towards desirable decision boundary by Moderate-Margin Adversarial Training.
Pattern Recognit. Lett., September, 2023

Object-free backdoor attack and defense on semantic segmentation.
Comput. Secur., September, 2023

Improving adversarial robustness of medical imaging systems via adding global attention noise.
Comput. Biol. Medicine, September, 2023

A projection algorithm for pseudomonotone vector fields with convex constraints on Hadamard manifolds.
Numer. Algorithms, July, 2023

Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art.
Comput. Secur., May, 2023

Modelling and analysis of online ride-sharing platforms - A sustainability perspective.
Eur. J. Oper. Res., 2023

F<sup>2</sup>AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns.
CoRR, 2023

Robust Backdoor Attacks on Object Detection in Real World.
CoRR, 2023

LEA<sup>2</sup>: A Lightweight Ensemble Adversarial Attack via Non-overlapping Vulnerable Frequency Regions.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
Crossmodality Person Reidentification Based on Global and Local Alignment.
Wirel. Commun. Mob. Comput., 2022

EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks.
ACM Trans. Priv. Secur., 2022

GAAT: Group Adaptive Adversarial Training to Improve the Trade-Off Between Robustness and Accuracy.
Int. J. Pattern Recognit. Artif. Intell., 2022

Leveraging transferability and improved beam search in textual adversarial attacks.
Neurocomputing, 2022

Hessian-Free Second-Order Adversarial Examples for Adversarial Learning.
CoRR, 2022

Visually imperceptible adversarial patch attacks.
Comput. Secur., 2022

Mammogram classification based on a novel convolutional neural network with efficient channel attention.
Comput. Biol. Medicine, 2022

NRI-FGSM: An Efficient Transferable Adversarial Attack for Speaker Recognition Systems.
Proceedings of the 23rd Annual Conference of the International Speech Communication Association, 2022

Robust Network Architecture Search via Feature Distortion Restraining.
Proceedings of the Computer Vision - ECCV 2022, 2022

Filter Pruning via Feature Discrimination in Deep Neural Networks.
Proceedings of the Computer Vision - ECCV 2022, 2022

Edge-Aware Guidance Fusion Network for RGB-Thermal Scene Parsing.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Versailles-FP dataset: Wall Detection in Ancient.
CoRR, 2021

Person Re-identification based on Robust Features in Open-world.
CoRR, 2021

Towards Speeding up Adversarial Training in Latent Spaces.
CoRR, 2021

Word-Level Textual Adversarial Attack in the Embedding Space.
Proceedings of the International Joint Conference on Neural Networks, 2021

Versailles-FP Dataset: Wall Detection in Ancient Floor Plans.
Proceedings of the 16th International Conference on Document Analysis and Recognition, 2021

2020
Towards Imperceptible Adversarial Image Patches Based on Network Explanations.
CoRR, 2020

TEAM: We Need More Powerful Adversarial Examples for DNNs.
CoRR, 2020

Towards Robust DNNs: An Taylor Expansion-Based Method for Generating Powerful Adversarial Examples.
CoRR, 2020

Spot evasion attacks: Adversarial examples for license plate recognition systems with convolutional neural networks.
Comput. Secur., 2020

EMSGD: An Improved Learning Algorithm of Neural Networks With Imbalanced Data.
IEEE Access, 2020

2019
Deep blind quality evaluator for multiply distorted images based on monogenic binary coding.
J. Vis. Commun. Image Represent., 2019

Spot Evasion Attacks: Adversarial Examples for License Plate Recognition Systems with Convolution Neural Networks.
CoRR, 2019

2014
Dynamic load distribution with hop-by-hop forwarding based on max-min one-way delay.
Sci. China Inf. Sci., 2014

2010
The Exploration of Course Design of Parallel Computing in Information and Computer Science Specialty.
Proceedings of the International Conference on E-Business and E-Government, 2010

The Exploration of Teaching about Java Programming.
Proceedings of the International Conference on E-Business and E-Government, 2010


  Loading...