Jinyin Chen
According to our database1,
Jinyin Chen
authored at least 92 papers
between 2006 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
On csauthors.net:
Bibliography
2022
IEEE Trans. Netw. Sci. Eng., 2022
ROBY: Evaluating the adversarial robustness of a deep model by its decision boundaries.
Inf. Sci., 2022
GAIL-PT: A Generic Intelligent Penetration Testing Framework with Generative Adversarial Imitation Learning.
CoRR, 2022
Appl. Intell., 2022
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2022, 2022
2021
Proceedings of the MDATA: A New Knowledge Representation Model, 2021
IEEE Trans. Syst. Man Cybern. Syst., 2021
IEEE Trans. Comput. Soc. Syst., 2021
IEEE Trans. Cogn. Commun. Netw., 2021
IEEE Trans. Circuits Syst. II Express Briefs, 2021
IEEE Trans. Circuits Syst. II Express Briefs, 2021
Phys. Commun., 2021
ACT-Detector: Adaptive channel transformation-based light-weighted detector for adversarial attacks.
Inf. Sci., 2021
Comput. Speech Lang., 2021
NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification.
CoRR, 2021
CatchBackdoor: Backdoor Testing by Critical Trojan Neural Path Identification via Differential Fuzzing.
CoRR, 2021
CoRR, 2021
Graph-Fraudster: Adversarial Attacks on Graph Neural Network Based Vertical Federated Learning.
CoRR, 2021
CoRR, 2021
CoRR, 2021
FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique.
Comput. Secur., 2021
Proceedings of the AISS 2021: 3rd International Conference on Advanced Information Science and System, Sanya, China, November 26, 2021
2020
IEEE Trans. Comput. Soc. Syst., 2020
Neurocomputing, 2020
Int. J. Comput. Sci. Eng., 2020
A novel radius adaptive based on center-optimized hybrid detector generation algorithm.
IEEE CAA J. Autom. Sinica, 2020
CoRR, 2020
CoRR, 2020
RCA-SOC: A novel adversarial defense by refocusing on critical areas and strengthening object contours.
Comput. Secur., 2020
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020
Proceedings of the 46th Annual Conference of the IEEE Industrial Electronics Society, 2020
Software visualization and deep transfer learning for effective software defect prediction.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020
DAS-AST: Defending Against Model Stealing Attacks Based on Adaptive Softmax Transformation.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020
Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020
2019
IEEE Trans. Comput. Soc. Syst., 2019
N2VSCDNNR: A Local Recommender System Based on Node2vec and Rich Information Network.
IEEE Trans. Comput. Soc. Syst., 2019
基于深度学习的智能教学系统的设计与研究 (Design and Research on Intelligent Teaching System Based on Deep Learning).
计算机科学, 2019
计算机科学, 2019
Comput. Secur., 2019
DGEPN-GCEN2V: a new framework for mining GGI and its application in biomarker detection.
Sci. China Inf. Sci., 2019
Appl. Intell., 2019
Robustness Analysis of Bipartite Task Assignment Networks: A Case Study in Hospital Logistics System.
IEEE Access, 2019
Proceedings of the 2019 11th International Conference on Machine Learning and Computing, 2019
Proceedings of the 2019 11th International Conference on Machine Learning and Computing, 2019
Proceedings of the third International Conference on Medical and Health Informatics 2019, 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
2018
Link Weight Prediction Using Supervised Learning Methods and Its Application to Yelp Layered Network.
IEEE Trans. Knowl. Data Eng., 2018
基于粒子群算法的支持向量机的参数优化 (Parameters Optimization for SVM Based on Particle Swarm Algorithm).
计算机科学, 2018
基于自适应免疫计算的网络攻击检测研究 (Research on Network Attack Detection Based on Self-adaptive Immune Computing).
计算机科学, 2018
基于MB-RRT*的无人机多点航迹规划算法研究 (Research on UAV Multi-point Navigation Algorithm Based on MB-RRT*).
计算机科学, 2018
基于在线学习行为分析的个性化学习推荐 (Personal Learning Recommendation Based on Online Learning Behavior Analysis).
计算机科学, 2018
Eng. Appl. Artif. Intell., 2018
DOE-AND-SCA: A Novel SCA Based on DNN With Optimal Eigenvectors and Automatic Cluster Number Determination.
IEEE Access, 2018
2017
计算机科学, 2017
计算机科学, 2017
An Efficient Classification Algorithm Based on T-Cells Maturation with No Parameters.
Int. J. Comput. Intell. Appl., 2017
Appl. Soft Comput., 2017
Appl. Soft Comput., 2017
2016
A fast density-based data stream clustering algorithm with cluster centers self-determined for mixed data.
Inf. Sci., 2016
2011
Proceedings of the Seventh International Conference on Natural Computation, 2011
2010
Constrained handling in multi-objective optimization based on Quantum-behaved particle swarm optimization.
Proceedings of the Sixth International Conference on Natural Computation, 2010
2009
Intrusion Detection System Platform Based on Light-Weighted Hybrid Artificial Immune Algorithms.
Proceedings of the Fifth International Conference on Natural Computation, 2009
2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Self-Adaptive Crossover Particle Swarm Optimizer for Multi-dimension Functions Optimization.
Proceedings of the Third International Conference on Natural Computation, 2007
2006
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006