Haibin Zheng

Orcid: 0000-0002-8997-5343

According to our database1, Haibin Zheng authored at least 86 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Link-Backdoor: Backdoor Attack on Link Prediction via Node Injection.
IEEE Trans. Comput. Soc. Syst., April, 2024

Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via Motifs.
IEEE Trans. Comput. Soc. Syst., April, 2024

A High-Efficiency and Incentive-Compatible Peer-to-Peer Energy Trading Mechanism.
IEEE Trans. Smart Grid, January, 2024

Robust explanations for graph neural network with neuron explanation component.
Inf. Sci., January, 2024

AdvCheck: Characterizing adversarial examples via local gradient checking.
Comput. Secur., January, 2024

Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction.
IEEE Trans. Netw. Sci. Eng., 2024

An Empirical Evaluation of the Data Leakage in Federated Graph Learning.
IEEE Trans. Netw. Sci. Eng., 2024

2023
GONE: A generic O(1) NoisE layer for protecting privacy of deep neural networks.
Comput. Secur., December, 2023

FedRight: An effective model copyright protection for federated learning.
Comput. Secur., December, 2023

Graphfool: Targeted Label Adversarial Attack on Graph Embedding.
IEEE Trans. Comput. Soc. Syst., October, 2023

Security and privacy protection technologies in securing blockchain applications.
Inf. Sci., October, 2023

An efficient blockchain-based anonymous authentication and supervision system.
Peer Peer Netw. Appl., September, 2023

PoE: Poisoning Enhancement Through Label Smoothing in Federated Learning.
IEEE Trans. Circuits Syst. II Express Briefs, August, 2023

Excitement surfeited turns to errors: Deep learning testing framework based on excitable neurons.
Inf. Sci., August, 2023

EGC<sup>2</sup>: Enhanced graph classification with easy graph compression.
Inf. Sci., June, 2023

Agent manipulator: Stealthy strategy attacks on deep reinforcement learning.
Appl. Intell., May, 2023

Graph-Fraudster: Adversarial Attacks on Graph Neural Network-Based Vertical Federated Learning.
IEEE Trans. Comput. Soc. Syst., April, 2023

Evil vs evil: using adversarial examples to against backdoor attack in federated learning.
Multim. Syst., April, 2023

GAIL-PT: An intelligent penetration testing framework with generative adversarial imitation learning.
Comput. Secur., March, 2023

Is Multi-Modal Necessarily Better? Robustness Evaluation of Multi-Modal Fake News Detection.
IEEE Trans. Netw. Sci. Eng., 2023

AIR: Threats of Adversarial Attacks on Deep Learning-Based Information Recovery.
CoRR, 2023

AdvCheck: Characterizing Adversarial Examples via Local Gradient Checking.
CoRR, 2023

Edge Deep Learning Model Protection via Neuron Authorization.
CoRR, 2023

One4All: Manipulate one agent to poison the cooperative multi-agent reinforcement learning.
Comput. Secur., 2023

CertPri: Certifiable Prioritization for Deep Neural Networks via Movement Cost in Feature Space.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

IKE: Threshold Key Escrow Service with Intermediary Encryption.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

2022
GRIP-GAN: An Attack-Free Defense Through General Robust Inverse Perturbation.
IEEE Trans. Dependable Secur. Comput., 2022

Implementation and Optimization of Zero-Knowledge Proof Circuit Based on Hash Function SM3.
Sensors, 2022

ROBY: Evaluating the adversarial robustness of a deep model by its decision boundaries.
Inf. Sci., 2022

Salient feature extractor for adversarial defense on deep neural networks.
Inf. Sci., 2022

ActGraph: Prioritization of Test Cases Based on Deep Neural Network Activation Graph.
CoRR, 2022

Rethinking the Defense Against Free-rider Attack From the Perspective of Model Weight Evolving Frequency.
CoRR, 2022

GAIL-PT: A Generic Intelligent Penetration Testing Framework with Generative Adversarial Imitation Learning.
CoRR, 2022

DeepSensor: Deep Learning Testing Framework Based on Neuron Sensitivity.
CoRR, 2022

NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Adversarial Attack Detection Based on Example Semantics and Model Activation Features.
Proceedings of the 5th International Conference on Data Science and Information Technology, 2022

An efficient anonymous authentication and supervision system based on blockchain.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

Attack and Defense Methods for Graph Vertical Federation Learning.
Proceedings of the 5th International Conference on Computer Science and Software Engineering, 2022

A Privacy-Preserving Credit Bank Supervision Framework Based on Redactable Blockchain.
Proceedings of the Blockchain and Trustworthy Systems - 4th International Conference, 2022

2021
Smoothing Adversarial Training for GNN.
IEEE Trans. Comput. Soc. Syst., 2021

MGA: Momentum Gradient Attack on Network.
IEEE Trans. Comput. Soc. Syst., 2021

DeepPoison: Feature Transfer Based Stealthy Poisoning Attack for DNNs.
IEEE Trans. Circuits Syst. II Express Briefs, 2021

Anti-Interpolation: An Attack Facilitator Hiding Adversaries Into Images.
IEEE Trans. Circuits Syst. II Express Briefs, 2021

FEM: Feature extraction and mapping for radio modulation classification.
Phys. Commun., 2021

Dynamic threshold ECDSA signature and application to asset custody in blockchain.
J. Inf. Secur. Appl., 2021

ACT-Detector: Adaptive channel transformation-based light-weighted detector for adversarial attacks.
Inf. Sci., 2021

Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction.
CoRR, 2021

Salient Feature Extractor for Adversarial Defense on Deep Neural Networks.
CoRR, 2021

DeepPoison: Feature Transfer Based Stealthy Poisoning Attack.
CoRR, 2021

FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique.
Comput. Secur., 2021

A PUF-based Lightweight Authenticated Metering Data Collection Scheme with Privacy Protection in Smart Grid.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Unsupervised Face Recognition Algorithm based on Fast Density Clustering Algorithm.
Proceedings of the AISS 2021: 3rd International Conference on Advanced Information Science and System, Sanya, China, November 26, 2021

2020
MAG-GAN: Massive attack generator via GAN.
Inf. Sci., 2020

Customizable text generation via conditional text generative adversarial network.
Neurocomputing, 2020

ROBY: Evaluating the Robustness of a Deep Model by its Decision Boundaries.
CoRR, 2020

An organization-friendly blockchain system.
Comput. Secur., 2020

RCA-SOC: A novel adversarial defense by refocusing on critical areas and strengthening object contours.
Comput. Secur., 2020

Attention Mechanism Based Adversarial Attack Against Deep Reinforcement Learning.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

Feature Explainable Deep Classification for Signal Modulation Recognition.
Proceedings of the 46th Annual Conference of the IEEE Industrial Electronics Society, 2020

SPA: Stealthy Poisoning Attack.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

2019
PSO-ANE: Adaptive Network Embedding With Particle Swarm Optimization.
IEEE Trans. Comput. Soc. Syst., 2019

N2VSCDNNR: A Local Recommender System Based on Node2vec and Rich Information Network.
IEEE Trans. Comput. Soc. Syst., 2019

POBA-GA: Perturbation optimized black-box adversarial attacks via genetic algorithm.
Comput. Secur., 2019

Achieving liability in anonymous communication: Auditing and tracing.
Comput. Commun., 2019

DGEPN-GCEN2V: a new framework for mining GGI and its application in biomarker detection.
Sci. China Inf. Sci., 2019

Distributed Audit System of SDN Controller Based on Blockchain.
Proceedings of the Smart Blockchain - Second International Conference, 2019

Distributed Secure Storage System Based on Blockchain and TPA.
Proceedings of the Network and System Security - 13th International Conference, 2019

Privacy-Preserving Sequential Data Publishing.
Proceedings of the Network and System Security - 13th International Conference, 2019

DAD-MCNN: DDoS Attack Detection via Multi-channel CNN.
Proceedings of the 2019 11th International Conference on Machine Learning and Computing, 2019

Out-of-store Object Detection Based on Deep Learning.
Proceedings of the 2019 11th International Conference on Machine Learning and Computing, 2019

DGFE-VG: Dynamic Gene Feature Extraction via Visibility Graph.
Proceedings of the third International Conference on Medical and Health Informatics 2019, 2019

Invisible Poisoning: Highly Stealthy Targeted Poisoning Attack.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2018
基于粒子群算法的支持向量机的参数优化 (Parameters Optimization for SVM Based on Particle Swarm Algorithm).
计算机科学, 2018

基于在线学习行为分析的个性化学习推荐 (Personal Learning Recommendation Based on Online Learning Behavior Analysis).
计算机科学, 2018

A novel image segmentation method based on fast density clustering algorithm.
Eng. Appl. Artif. Intell., 2018

GC-LSTM: Graph Convolution Embedded LSTM for Dynamic Link Prediction.
CoRR, 2018

FineFool: Fine Object Contour Attack via Attention.
CoRR, 2018

Link Prediction Adversarial Attack.
CoRR, 2018

Fast Gradient Attack on Network Embedding.
CoRR, 2018

A Social-Network-Based Cryptocurrency Wallet-Management Scheme.
IEEE Access, 2018

Auditable Hierarchy-Private Public-Key Encryption.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

Linkable Group Signature for Auditing Anonymous Communication.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Study on hydrodynamic performance and CFD simulation of AUV.
Proceedings of the IEEE International Conference on Information and Automation, 2017

2016
Threshold attribute-based signcryption and its application to authenticated key agreement.
Secur. Commun. Networks, 2016

2015
Threshold Attribute-Based Signcryption in Standard Model.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
An Experimental Analysis on Latency Improvement of Cloud-Based Fleet Management System.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014


  Loading...