Haibin Zheng
Orcid: 0000-0002-8997-5343
According to our database1,
Haibin Zheng
authored at least 86 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Comput. Soc. Syst., April, 2024
IEEE Trans. Comput. Soc. Syst., April, 2024
IEEE Trans. Smart Grid, January, 2024
Inf. Sci., January, 2024
Comput. Secur., January, 2024
IEEE Trans. Netw. Sci. Eng., 2024
IEEE Trans. Netw. Sci. Eng., 2024
2023
Comput. Secur., December, 2023
Comput. Secur., December, 2023
IEEE Trans. Comput. Soc. Syst., October, 2023
Inf. Sci., October, 2023
Peer Peer Netw. Appl., September, 2023
IEEE Trans. Circuits Syst. II Express Briefs, August, 2023
Excitement surfeited turns to errors: Deep learning testing framework based on excitable neurons.
Inf. Sci., August, 2023
Inf. Sci., June, 2023
Appl. Intell., May, 2023
Graph-Fraudster: Adversarial Attacks on Graph Neural Network-Based Vertical Federated Learning.
IEEE Trans. Comput. Soc. Syst., April, 2023
Evil vs evil: using adversarial examples to against backdoor attack in federated learning.
Multim. Syst., April, 2023
GAIL-PT: An intelligent penetration testing framework with generative adversarial imitation learning.
Comput. Secur., March, 2023
Is Multi-Modal Necessarily Better? Robustness Evaluation of Multi-Modal Fake News Detection.
IEEE Trans. Netw. Sci. Eng., 2023
CoRR, 2023
CoRR, 2023
One4All: Manipulate one agent to poison the cooperative multi-agent reinforcement learning.
Comput. Secur., 2023
CertPri: Certifiable Prioritization for Deep Neural Networks via Movement Cost in Feature Space.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
Implementation and Optimization of Zero-Knowledge Proof Circuit Based on Hash Function SM3.
Sensors, 2022
ROBY: Evaluating the adversarial robustness of a deep model by its decision boundaries.
Inf. Sci., 2022
Inf. Sci., 2022
ActGraph: Prioritization of Test Cases Based on Deep Neural Network Activation Graph.
CoRR, 2022
Rethinking the Defense Against Free-rider Attack From the Perspective of Model Weight Evolving Frequency.
CoRR, 2022
GAIL-PT: A Generic Intelligent Penetration Testing Framework with Generative Adversarial Imitation Learning.
CoRR, 2022
NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Adversarial Attack Detection Based on Example Semantics and Model Activation Features.
Proceedings of the 5th International Conference on Data Science and Information Technology, 2022
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022
Proceedings of the 5th International Conference on Computer Science and Software Engineering, 2022
A Privacy-Preserving Credit Bank Supervision Framework Based on Redactable Blockchain.
Proceedings of the Blockchain and Trustworthy Systems - 4th International Conference, 2022
2021
IEEE Trans. Circuits Syst. II Express Briefs, 2021
IEEE Trans. Circuits Syst. II Express Briefs, 2021
Phys. Commun., 2021
J. Inf. Secur. Appl., 2021
ACT-Detector: Adaptive channel transformation-based light-weighted detector for adversarial attacks.
Inf. Sci., 2021
CoRR, 2021
FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique.
Comput. Secur., 2021
A PUF-based Lightweight Authenticated Metering Data Collection Scheme with Privacy Protection in Smart Grid.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
Proceedings of the AISS 2021: 3rd International Conference on Advanced Information Science and System, Sanya, China, November 26, 2021
2020
Neurocomputing, 2020
CoRR, 2020
RCA-SOC: A novel adversarial defense by refocusing on critical areas and strengthening object contours.
Comput. Secur., 2020
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020
Proceedings of the 46th Annual Conference of the IEEE Industrial Electronics Society, 2020
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020
2019
IEEE Trans. Comput. Soc. Syst., 2019
N2VSCDNNR: A Local Recommender System Based on Node2vec and Rich Information Network.
IEEE Trans. Comput. Soc. Syst., 2019
Comput. Secur., 2019
Comput. Commun., 2019
DGEPN-GCEN2V: a new framework for mining GGI and its application in biomarker detection.
Sci. China Inf. Sci., 2019
Proceedings of the Smart Blockchain - Second International Conference, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the 2019 11th International Conference on Machine Learning and Computing, 2019
Proceedings of the 2019 11th International Conference on Machine Learning and Computing, 2019
Proceedings of the third International Conference on Medical and Health Informatics 2019, 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
2018
基于粒子群算法的支持向量机的参数优化 (Parameters Optimization for SVM Based on Particle Swarm Algorithm).
计算机科学, 2018
基于在线学习行为分析的个性化学习推荐 (Personal Learning Recommendation Based on Online Learning Behavior Analysis).
计算机科学, 2018
Eng. Appl. Artif. Intell., 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
Proceedings of the IEEE International Conference on Information and Automation, 2017
2016
Threshold attribute-based signcryption and its application to authenticated key agreement.
Secur. Commun. Networks, 2016
2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2014
An Experimental Analysis on Latency Improvement of Cloud-Based Fleet Management System.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014