Wenrong Jiang

According to our database1, Wenrong Jiang authored at least 19 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Graph-Fraudster: Adversarial Attacks on Graph Neural Network-Based Vertical Federated Learning.
IEEE Trans. Comput. Soc. Syst., April, 2023

2022
GraphAttacker: A General Multi-Task Graph Attack Framework.
IEEE Trans. Netw. Sci. Eng., 2022

Salient feature extractor for adversarial defense on deep neural networks.
Inf. Sci., 2022

Intrusion Detection Method Based On Improved Conditional Generative Adversarial Network.
Proceedings of the International Conference on Artificial Intelligence, 2022

2021
Graph-Fraudster: Adversarial Attacks on Graph Neural Network Based Vertical Federated Learning.
CoRR, 2021

Salient Feature Extractor for Adversarial Defense on Deep Neural Networks.
CoRR, 2021

Graphfool: Targeted Label Adversarial Attack on Graph Embedding.
CoRR, 2021

Research on Human Fall Detection Based on Tiny-yolov3 Algorithm.
Proceedings of the EITCE 2021: 5th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, October 22, 2021

Research on the Recommendation Algorithm Based on 0-1 Knapsack Problem.
Proceedings of the CONF-CDS 2021: The 2nd International Conference on Computing and Data Science, 2021

2020
On isolation of simple multiple zeros and clusters of zeros of polynomial systems.
Math. Comput., 2020

2018
Cryptography Teaching Based on Problem Oriented: Take the Knowledge Point of Designated Verifier Signature as an Example.
Proceedings of the 2nd International Conference on E-Education, 2018

Security Analysis and Improvement of Partially Blind Proxy Re-signature Scheme.
Proceedings of the 8th International Conference on Communication and Network Security, 2018

App Tamper Detection and Retrospective Program Research.
Proceedings of the Computational Data and Social Networks - 7th International Conference, 2018

Cryptoanalyzing and Improving for Directed Signature Scheme and the Proxy Signature Scheme.
Proceedings of the 11th International Congress on Image and Signal Processing, 2018

2017
改进的无证书广义指定验证者聚合签名方案 (Improved Certificateless Aggregate Signature Scheme with Universal Designated Verifier).
计算机科学, 2017

2014
Data Caching Techniques in Web Application.
Proceedings of the Enterprise Systems Conference, 2014

2010
Research on Collaboration Software Based on JBPM and Lightweight J2EE Framework.
Proceedings of the International Conference on E-Business and E-Government, 2010

2009
Approach for Name Ambiguity Problem Using a Multiple-Layer Clustering.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

OEA_SAT: An Organizational Evolutionary Algorithm for solving SATisfiability problems.
Proceedings of the IEEE Congress on Evolutionary Computation, 2009


  Loading...