Haibin Zheng

According to our database1, Haibin Zheng authored at least 18 papers between 2014 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
PSO-ANE: Adaptive Network Embedding With Particle Swarm Optimization.
IEEE Trans. Comput. Social Systems, 2019

N2VSCDNNR: A Local Recommender System Based on Node2vec and Rich Information Network.
IEEE Trans. Comput. Social Systems, 2019

POBA-GA: Perturbation Optimized Black-Box Adversarial Attacks via Genetic Algorithm.
CoRR, 2019

N2VSCDNNR: A Local Recommender System Based on Node2vec and Rich Information Network.
CoRR, 2019

POBA-GA: Perturbation optimized black-box adversarial attacks via genetic algorithm.
Computers & Security, 2019

Achieving liability in anonymous communication: Auditing and tracing.
Computer Communications, 2019

DGEPN-GCEN2V: a new framework for mining GGI and its application in biomarker detection.
SCIENCE CHINA Information Sciences, 2019

2018
A novel image segmentation method based on fast density clustering algorithm.
Eng. Appl. of AI, 2018

GC-LSTM: Graph Convolution Embedded LSTM for Dynamic Link Prediction.
CoRR, 2018

FineFool: Fine Object Contour Attack via Attention.
CoRR, 2018

Link Prediction Adversarial Attack.
CoRR, 2018

Fast Gradient Attack on Network Embedding.
CoRR, 2018

A Social-Network-Based Cryptocurrency Wallet-Management Scheme.
IEEE Access, 2018

Auditable Hierarchy-Private Public-Key Encryption.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

Linkable Group Signature for Auditing Anonymous Communication.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2016
Threshold attribute-based signcryption and its application to authenticated key agreement.
Security and Communication Networks, 2016

2015
Threshold Attribute-Based Signcryption in Standard Model.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
An Experimental Analysis on Latency Improvement of Cloud-Based Fleet Management System.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014


  Loading...