Lingwei Chen

Orcid: 0000-0003-1550-6170

According to our database1, Lingwei Chen authored at least 52 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enhancing vulnerability detection via AST decomposition and neural sub-tree encoding.
Expert Syst. Appl., March, 2024

Adversary for Social Good: Leveraging Adversarial Attacks to Protect Personal Attribute Privacy.
ACM Trans. Knowl. Discov. Data, February, 2024

A coherence-improved and mass-balanced inflow turbulence generation method for large eddy simulation.
J. Comput. Phys., February, 2024

Hierarchical Knowledge Distillation on Text Graph for Data-limited Attribute Inference.
CoRR, 2024

2023
CVII: Enhancing Interpretability in Intelligent Sensor Systems via Computer Vision Interpretability Index.
Sensors, December, 2023

Are Your Explanations Reliable? Investigating the Stability of LIME in Explaining Textual Classification Models via Adversarial Perturbation.
CoRR, 2023

Knowledge Distillation on Cross-Modal Adversarial Reprogramming for Data-Limited Attribute Inference.
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023

Automatically Inferring Image Base Addresses of ARM32 Binaries Using Architecture Features.
Proceedings of the Ubiquitous Security, 2023

Hierarchical Graph Neural Network for Patient Treatment Preference Prediction with External Knowledge.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023

Pseudo-Labeling with Graph Active Learning for Few-shot Node Classification.
Proceedings of the IEEE International Conference on Data Mining, 2023

Mining Themes in Clinical Notes to Identify Phenotypes and to Predict Length of Stay in Patients admitted with Heart Failure.
Proceedings of the IEEE International Conference on Digital Health, 2023

"Are Your Explanations Reliable?" Investigating the Stability of LIME in Explaining Text Classifiers by Marrying XAI and Adversarial Attack.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

Leveraging Comment Retrieval for Code Summarization.
Proceedings of the Advances in Information Retrieval, 2023

HOVER: Homophilic Oversampling via Edge Removal for Class-Imbalanced Bot Detection on Graphs.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

Enhancing Rare Cell Type Identification in Single-Cell Data: An Innovative Gene Filtering Approach using Bipartite Cell-Gene Relation Graph.
Proceedings of the IEEE EMBS International Conference on Biomedical and Health Informatics, 2023

2022
Landscape estimation of solidity version usage on Ethereum via version identification.
Int. J. Intell. Syst., 2022

Distilling Knowledge on Text Graph for Social Media Attribute Inference.
Proceedings of the SIGIR '22: The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, Madrid, Spain, July 11, 2022

Ethereum Smart Contract Representation Learning for Robust Bytecode-Level Similarity Detection.
Proceedings of the 34th International Conference on Software Engineering and Knowledge Engineering, 2022

Adversary for Social Good: Leveraging Attribute-Obfuscating Attack to Protect User Privacy on Social Networks.
Proceedings of the Security and Privacy in Communication Networks, 2022

Adversarially Reprogramming Pretrained Neural Networks for Data-limited and Cost-efficient Malware Detection.
Proceedings of the 2022 SIAM International Conference on Data Mining, 2022

Summarizing Source Code from Structure and Context.
Proceedings of the International Joint Conference on Neural Networks, 2022

FuzzBoost: Reinforcement Compiler Fuzzing.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

ALPHAPROG: Reinforcement Generation of Valid Programs for Compiler Fuzzing.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Pyramid Co-Attention Compare Network for Few-Shot Segmentation.
IEEE Access, 2021

Fine-Grained Compiler Identification With Sequence-Oriented Neural Modeling.
IEEE Access, 2021

Turning Attacks into Protection: Social Media Privacy Protection Using Adversarial Attacks.
Proceedings of the 2021 SIAM International Conference on Data Mining, 2021

Watermarking-based Defense against Adversarial Attacks on Deep Neural Networks.
Proceedings of the International Joint Conference on Neural Networks, 2021

Compare Network with Task-dependent Embeddings for Few-shot Learning.
Proceedings of the International Joint Conference on Neural Networks, 2021

Adversarial Reprogramming of Pretrained Neural Networks for Fraud Detection.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

2020
Plagiarism Detection of Multi-threaded Programs Using Frequent Behavioral Pattern Mining.
Int. J. Softw. Eng. Knowl. Eng., 2020

Plagiarism Detection of Multi-Threaded Programs via Siamese Neural Networks.
IEEE Access, 2020

Towards Fine-Grained Compiler Identification with Neural Modeling.
Proceedings of the 32nd International Conference on Software Engineering and Knowledge Engineering, 2020

Plagiarism Detection of Multi-threaded Programs using Frequent Behavioral Pattern Mining.
Proceedings of the 32nd International Conference on Software Engineering and Knowledge Engineering, 2020

Enhancing Robustness of Graph Convolutional Networks via Dropping Graph Connections.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2020

2019
Higher-order Weighted Graph Convolutional Networks.
CoRR, 2019

Out-of-sample Node Representation Learning for Heterogeneous Graph in Real-time Android Malware Detection.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

iDev: Enhancing Social Coding Security by Cross-platform User Identification Between GitHub and Stack Overflow.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

iTrustSO: an intelligent system for automatic detection of insecure code snippets in stack overflow.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

2018
DeepAM: a heterogeneous deep learning framework for intelligent malware detection.
Knowl. Inf. Syst., 2018

AiDroid: When Heterogeneous Information Network Marries Deep Neural Network for Real-time Android Malware Detection.
CoRR, 2018

DroidEye: Fortifying Security of Learning-Based Classifier Against Adversarial Android Malware Attacks.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

ICSD: An Automatic System for Insecure Code Snippet Detection in Stack Overflow over Heterogeneous Information Network.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Adversarial Machine Learning in Malware Detection: Arms Race between Evasion Attack and Defense.
Proceedings of the European Intelligence and Security Informatics Conference, 2017

SecMD: Make Machine Learning More Secure Against Adversarial Malware Attacks.
Proceedings of the AI 2017: Advances in Artificial Intelligence, 2017

Deep Neural Networks for Automatic Android Malware Detection.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

Deep Analysis and Utilization of Malware's Social Relation Network for Its Detection.
Proceedings of the Web and Big Data, 2017

An Adversarial Machine Learning Model Against Android Malware Evasion Attacks.
Proceedings of the Web and Big Data, 2017

SecureDroid: Enhancing Security of Machine Learning-based Detection against Adversarial Android Malware Attacks.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Automatic Detection of Helmet Uses for Construction Safety.
Proceedings of the 2016 IEEE/WIC/ACM International Conference on Web Intelligence, 2016

2015
Analyzing File-to-File Relation Network in Malware Detection.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015

Intelligent malware detection based on file relation graphs.
Proceedings of the 9th IEEE International Conference on Semantic Computing, 2015

2008
Blind Image Restoration Using Divisional Regularization and Wavelet Technique.
Proceedings of the Fourth International Conference on Natural Computation, 2008


  Loading...