Xingyuan Chen

Orcid: 0000-0003-1928-5555

According to our database1, Xingyuan Chen authored at least 74 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SAM4UDASS: When SAM Meets Unsupervised Domain Adaptive Semantic Segmentation in Intelligent Vehicles.
CoRR, 2024

2023
A novel combination rule for conflict management in data fusion.
Soft Comput., November, 2023

Adversarial robustness in deep neural networks based on variable attributes of the stochastic ensemble model.
Frontiers Neurorobotics, June, 2023

An adversarial transferability metric based on SVD of Jacobians to disentangle the correlation with robustness.
Appl. Intell., May, 2023

A new belief entropy and its application in software risk analysis.
Int. J. Comput. Commun. Control, April, 2023

Tactics2D: A Multi-agent Reinforcement Learning Environment for Driving Decision-making.
CoRR, 2023

An iterative method for Helmholtz boundary value problems arising in wave propagation.
CoRR, 2023

Dynamic ensemble selection based on Deep Neural Network Uncertainty Estimation for Adversarial Robustness.
CoRR, 2023

Wellposedness, exponential ergodicity and numerical approximation of fully super-linear McKean-Vlasov SDEs and associated particle systems.
CoRR, 2023

A Near Real-Time Big Data Provenance Generation Method Based on the Conjoint Analysis of Heterogeneous Logs.
IEEE Access, 2023

Epidemic Prediction Algorithm Based on Deep Learning and Epidemic Dynamics.
Proceedings of the 4th International Conference on Machine Learning and Computer Application, 2023

2022
Impact of Shifts in Vegetation Phenology on the Carbon Balance of a Semiarid Sagebrush Ecosystem.
Remote. Sens., December, 2022

Guidelines for Publicly Archiving Terrestrial Model Data to Enhance Usability, Intercomparison, and Synthesis.
Data Sci. J., 2022

Euler simulation of interacting particle systems and McKean-Vlasov SDEs with fully superlinear growth drifts in space and interaction.
CoRR, 2022

Application of Machine Learning Methods in Inferring Surface Water Groundwater Exchanges using High Temporal Resolution Temperature Measurements.
CoRR, 2022

The detection of distributional discrepancy for language GANs.
Connect. Sci., 2022

A flexible split-step scheme for solving McKean-Vlasov stochastic differential equations.
Appl. Math. Comput., 2022

FSAFlow: Lightweight and Fast Dynamic Path Tracking and Control for Privacy Protection on Android Using Hybrid Analysis with State-Reduction Strategy.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Corpus Construction for Generating Knowledge Graph of Sichuan Cuisine.
Proceedings of the Chinese Lexical Semantics - 23rd Workshop, 2022

A primary study on diversity of question generation.
Proceedings of the 18th International Conference on Computational Intelligence and Security, 2022

2021
Distributional discrepancy: A metric for unconditional text generation.
Knowl. Based Syst., 2021

Person Re-Identification by Low-Dimensional Features and Metric Learning.
Future Internet, 2021

Coupling surface flow with high-performance subsurface reactive flow and transport code PFLOTRAN.
Environ. Model. Softw., 2021

DART-PFLOTRAN: An ensemble-based data assimilation system for estimating subsurface flow and transport model parameters.
Environ. Model. Softw., 2021

Adversarial subsequences for unconditional text generation.
Comput. Speech Lang., 2021

A flexible split-step scheme for MV-SDEs.
CoRR, 2021

Dynamic Defense Approach for Adversarial Robustness in Deep Neural Networks via Stochastic Ensemble Smoothed Model.
CoRR, 2021

Tenant-Led Ciphertext Information Flow Control for Cloud Virtual Machines.
IEEE Access, 2021

Gradient-based Dynamic Dropout.
Proceedings of the 17th International Conference on Computational Intelligence and Security CIS 2021, 2021

Dropout Token To Improve Neural Language Model.
Proceedings of the 17th International Conference on Computational Intelligence and Security CIS 2021, 2021

2020
An Adaptive Authenticated Data Structure With Privacy-Preserving for Big Data Stream in Cloud.
IEEE Trans. Inf. Forensics Secur., 2020

A Discriminator Improves Unconditional Text Generation without Updating the Generator.
CoRR, 2020

A Big Data Provenance Model for Data Security Supervision Based on PROV-DM Model.
IEEE Access, 2020

The errors analysis of natural language generation - A case study of Topic-to-Essay generation.
Proceedings of the 16th International Conference on Computational Intelligence and Security, 2020

2019
Reducing Security Risks of Suspicious Data and Codes Through a Novel Dynamic Defense Model.
IEEE Trans. Inf. Forensics Secur., 2019

The Detection of Distributional Discrepancy for Text Generation.
CoRR, 2019

Adversarial Sub-sequence for Text Generation.
CoRR, 2019

Exploring Context's Diversity to Improve Neural Language Model.
Proceedings of the International Conference on Asian Language Processing, 2019

2018
Time Synchronization Algorithm for Wireless Sensor Networks Based on Frequency Offset Estimation.
Int. J. Online Eng., 2018

Quantum computing cryptography: Unveiling cryptographic Boolean functions with quantum annealing.
CoRR, 2018

CDroid: practically implementation a formal-analyzed CIFC model on Android.
Comput. Secur., 2018

Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing.
IEEE Access, 2018

2017
Dynamic authenticated data structures with access control for outsourcing data stream.
IET Inf. Secur., 2017

PFLOTRAN-E4D: A parallel open source PFLOTRAN module for simulating time-lapse electrical resistivity data.
Comput. Geosci., 2017

2016
素数阶群上具有扩展通配符的ABE方案 (ABE Scheme with Generalized Wildcards on Prime Order Groups).
计算机科学, 2016

CUDA-Based Parallel Implementation of IBM Word Alignment Algorithm for Statistical Machine Translation.
Proceedings of the 17th International Conference on Parallel and Distributed Computing, 2016

Bag-of-Embeddings for Text Classification.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Integrating Character Representations into Chinese Word Embedding.
Proceedings of the Chinese Lexical Semantics - 17th Workshop, 2016

Parallel Acceleration of IBM Alignment Model based on Lock-Free Hash Table.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

2015
基于RBAC的授权管理安全准则分析与研究 (Security Principles for RBAC-based Authorization Management).
计算机科学, 2015

可验证授权计算研究综述 (Survey on Verifiable Delegation of Computation).
计算机科学, 2015

网络隐蔽信道实现机制及检测技术研究 (Implementation and Detection of Network Covert Channel).
计算机科学, 2015

基于结构路径的恶意PDF文档检测 (Detection of Malicious PDF Based on Structural Path).
计算机科学, 2015

The Construction of a Kind of Chat Corpus in Chinese Word Segmentation.
Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2015

Chinese Spelling Errors Detection Based on CSLM.
Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2015

A Hybrid Multiscale Framework for Subsurface Flow and Transport Simulations.
Proceedings of the International Conference on Computational Science, 2015

Dataless Text Classification with Descriptive LDA.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
A high-performance workflow system for subsurface simulation.
Environ. Model. Softw., 2014

Integrating Pinyin to Improve Spelling Errors Detection for Chinese Language.
Proceedings of the 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), Warsaw, Poland, August 11-14, 2014, 2014

A finer-grained resource management model oriented to role-based access control.
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014

2013
An Efficient Elliptic Curve Discrete Logarithm based Trapdoor Hash Scheme without Key Exposure.
J. Comput., 2013

Numerical Modelling of Viscoelastic Fluid-Structure Interaction and Its Application for a Valveless Micropump.
Proceedings of the Numerical Mathematics and Advanced Applications - ENUMATH 2013, 2013

A Word Sense Probabilistic Topic Model.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

A Fast Algorithm of Computing Word Similarity.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
Optimal mining on security labels for decentralized information flow control.
Comput. Secur., 2012

2011
An Improved Framework of Disaster-Tolerance Oriented Adaptive Failure Detection.
Proceedings of the 4th International Symposium on Computational Intelligence and Design, 2011

Construction of Overflow Attacks Based on Attack Element and Attack Template.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2009
An Algebra for Composing Access Control Policies in Grid.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2008
A Novel Trust Collecting Mechanism Based on Publish/Subscribe Scheme in Grid Computing.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Layered Secure Access Research for Space Network.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

Research on DoS Atomic Attack Oriented to Attack Resistance Test.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Policy Monitoring and a Finite State Automata Model.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Network System Model-Based Multi-level Policy Generation and Representation.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
A Method of Fine-Grained Authorization and Access Control for ASP Pages.
Proceedings of the Computational Intelligence and Security, International Conference, 2007


  Loading...