Follow
Haibin Zheng
Haibin Zheng
Verified email at zjut.edu.cn - Homepage
Title
Cited by
Cited by
Year
GC-LSTM: Graph convolution embedded LSTM for dynamic network link prediction
J Chen, X Wang, X Xu
Applied Intelligence, 1-16, 2022
3252022
Fast gradient attack on network embedding
J Chen, Y Wu, X Xu, Y Chen, H Zheng, Q Xuan
arXiv preprint arXiv:1809.02797, 2018
1872018
POBA-GA: Perturbation optimized black-box adversarial attacks via genetic algorithm
J Chen, M Su, S Shen, H Xiong, H Zheng
Computers & Security 85, 89-106, 2019
782019
Neuronfair: Interpretable white-box fairness testing through biased neuron identification
H Zheng, Z Chen, T Du, X Zhang, Y Cheng, S Ji, J Wang, Y Yu, J Chen
Proceedings of the 44th International Conference on Software Engineering …, 2022
55*2022
DAD-MCNN: DDoS attack detection via multi-channel CNN
J Chen, Y Yang, K Hu, H Zheng, Z Wang
Proceedings of the 2019 11th International Conference on Machine Learning …, 2019
482019
A novel image segmentation method based on fast density clustering algorithm
J Chen, H Zheng, X Lin, Y Wu, M Su
Engineering Applications of Artificial Intelligence 73, 92-110, 2018
472018
Graph-fraudster: Adversarial attacks on graph neural network-based vertical federated learning
J Chen, G Huang, H Zheng, S Yu, W Jiang, C Cui
IEEE Transactions on Computational Social Systems 10 (2), 492-506, 2022
452022
MGA: Momentum gradient attack on network
J Chen, Y Chen, H Zheng, S Shen, S Yu, D Zhang, Q Xuan
IEEE Transactions on Computational Social Systems 8 (1), 99-109, 2020
452020
GAIL-PT: An intelligent penetration testing framework with generative adversarial imitation learning
J Chen, S Hu, H Zheng, C Xing, G Zhang
Computers & Security 126, 103055, 2023
39*2023
Customizable text generation via conditional text generative adversarial network
J Chen, Y Wu, C Jia, H Zheng, G Huang
Neurocomputing 416, 125-135, 2020
372020
Link prediction adversarial attack
J Chen, Z Shi, Y Wu, X Xu, H Zheng
arXiv preprint arXiv:1810.01110, 2018
362018
N2VSCDNNR: A local recommender system based on node2vec and rich information network
J Chen, Y Wu, L Fan, X Lin, H Zheng, S Yu, Q Xuan
IEEE Transactions on Computational Social Systems 6 (3), 456-466, 2019
352019
Smoothing adversarial training for GNN
J Chen, X Lin, H Xiong, Y Wu, H Zheng, Q Xuan
IEEE Transactions on Computational Social Systems 8 (3), 618-629, 2020
322020
MAG-GAN: Massive attack generator via GAN
J Chen, H Zheng, H Xiong, S Shen, M Su
Information Sciences 536, 67-90, 2020
322020
Motif-backdoor: Rethinking the backdoor attack on graph neural networks via motifs
H Zheng, H Xiong, J Chen, H Ma, G Huang
IEEE Transactions on Computational Social Systems 11 (2), 2479-2493, 2023
292023
Invisible poisoning: Highly stealthy targeted poisoning attack
J Chen, H Zheng, M Su, T Du, C Lin, S Ji
Information Security and Cryptology: 15th International Conference, Inscrypt …, 2020
292020
FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique
J Chen, H Zheng, H Xiong, R Chen, T Du, Z Hong, S Ji
Computers & Security 104, 102220, 2021
272021
Deeppoison: Feature transfer based stealthy poisoning attack for dnns
J Chen, L Zhang, H Zheng, X Wang, Z Ming
IEEE Transactions on Circuits and Systems II: Express Briefs 68 (7), 2618-2622, 2021
272021
GRIP-GAN: An attack-free defense through general robust inverse perturbation
H Zheng, J Chen, H Du, W Zhu, S Ji, X Zhang
IEEE Transactions on Dependable and Secure Computing 19 (6), 4204-4224, 2021
262021
Generative dynamic link prediction
J Chen, X Lin, C Jia, Y Li, Y Wu, H Zheng, Y Liu
Chaos: An Interdisciplinary Journal of Nonlinear Science 29 (12), 2019
222019
The system can't perform the operation now. Try again later.
Articles 1–20