GC-LSTM: Graph convolution embedded LSTM for dynamic network link prediction J Chen, X Wang, X Xu Applied Intelligence, 1-16, 2022 | 325 | 2022 |
Fast gradient attack on network embedding J Chen, Y Wu, X Xu, Y Chen, H Zheng, Q Xuan arXiv preprint arXiv:1809.02797, 2018 | 187 | 2018 |
POBA-GA: Perturbation optimized black-box adversarial attacks via genetic algorithm J Chen, M Su, S Shen, H Xiong, H Zheng Computers & Security 85, 89-106, 2019 | 78 | 2019 |
Neuronfair: Interpretable white-box fairness testing through biased neuron identification H Zheng, Z Chen, T Du, X Zhang, Y Cheng, S Ji, J Wang, Y Yu, J Chen Proceedings of the 44th International Conference on Software Engineering …, 2022 | 55* | 2022 |
DAD-MCNN: DDoS attack detection via multi-channel CNN J Chen, Y Yang, K Hu, H Zheng, Z Wang Proceedings of the 2019 11th International Conference on Machine Learning …, 2019 | 48 | 2019 |
A novel image segmentation method based on fast density clustering algorithm J Chen, H Zheng, X Lin, Y Wu, M Su Engineering Applications of Artificial Intelligence 73, 92-110, 2018 | 47 | 2018 |
Graph-fraudster: Adversarial attacks on graph neural network-based vertical federated learning J Chen, G Huang, H Zheng, S Yu, W Jiang, C Cui IEEE Transactions on Computational Social Systems 10 (2), 492-506, 2022 | 45 | 2022 |
MGA: Momentum gradient attack on network J Chen, Y Chen, H Zheng, S Shen, S Yu, D Zhang, Q Xuan IEEE Transactions on Computational Social Systems 8 (1), 99-109, 2020 | 45 | 2020 |
GAIL-PT: An intelligent penetration testing framework with generative adversarial imitation learning J Chen, S Hu, H Zheng, C Xing, G Zhang Computers & Security 126, 103055, 2023 | 39* | 2023 |
Customizable text generation via conditional text generative adversarial network J Chen, Y Wu, C Jia, H Zheng, G Huang Neurocomputing 416, 125-135, 2020 | 37 | 2020 |
Link prediction adversarial attack J Chen, Z Shi, Y Wu, X Xu, H Zheng arXiv preprint arXiv:1810.01110, 2018 | 36 | 2018 |
N2VSCDNNR: A local recommender system based on node2vec and rich information network J Chen, Y Wu, L Fan, X Lin, H Zheng, S Yu, Q Xuan IEEE Transactions on Computational Social Systems 6 (3), 456-466, 2019 | 35 | 2019 |
Smoothing adversarial training for GNN J Chen, X Lin, H Xiong, Y Wu, H Zheng, Q Xuan IEEE Transactions on Computational Social Systems 8 (3), 618-629, 2020 | 32 | 2020 |
MAG-GAN: Massive attack generator via GAN J Chen, H Zheng, H Xiong, S Shen, M Su Information Sciences 536, 67-90, 2020 | 32 | 2020 |
Motif-backdoor: Rethinking the backdoor attack on graph neural networks via motifs H Zheng, H Xiong, J Chen, H Ma, G Huang IEEE Transactions on Computational Social Systems 11 (2), 2479-2493, 2023 | 29 | 2023 |
Invisible poisoning: Highly stealthy targeted poisoning attack J Chen, H Zheng, M Su, T Du, C Lin, S Ji Information Security and Cryptology: 15th International Conference, Inscrypt …, 2020 | 29 | 2020 |
FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique J Chen, H Zheng, H Xiong, R Chen, T Du, Z Hong, S Ji Computers & Security 104, 102220, 2021 | 27 | 2021 |
Deeppoison: Feature transfer based stealthy poisoning attack for dnns J Chen, L Zhang, H Zheng, X Wang, Z Ming IEEE Transactions on Circuits and Systems II: Express Briefs 68 (7), 2618-2622, 2021 | 27 | 2021 |
GRIP-GAN: An attack-free defense through general robust inverse perturbation H Zheng, J Chen, H Du, W Zhu, S Ji, X Zhang IEEE Transactions on Dependable and Secure Computing 19 (6), 4204-4224, 2021 | 26 | 2021 |
Generative dynamic link prediction J Chen, X Lin, C Jia, Y Li, Y Wu, H Zheng, Y Liu Chaos: An Interdisciplinary Journal of Nonlinear Science 29 (12), 2019 | 22 | 2019 |