Follow
Haibin Zheng
Haibin Zheng
Verified email at zjut.edu.cn
Title
Cited by
Cited by
Year
GC-LSTM: Graph convolution embedded LSTM for dynamic network link prediction
J Chen, X Wang, X Xu
Applied Intelligence, 1-16, 2022
2512022
Fast gradient attack on network embedding
J Chen, Y Wu, X Xu, Y Chen, H Zheng, Q Xuan
arXiv preprint arXiv:1809.02797, 2018
1582018
POBA-GA: Perturbation optimized black-box adversarial attacks via genetic algorithm
J Chen, M Su, S Shen, H Xiong, H Zheng
Computers & Security 85, 89-106, 2019
692019
A novel image segmentation method based on fast density clustering algorithm
J Chen, H Zheng, X Lin, Y Wu, M Su
Engineering Applications of Artificial Intelligence 73, 92-110, 2018
432018
Neuronfair: Interpretable white-box fairness testing through biased neuron identification
H Zheng, Z Chen, T Du, X Zhang, Y Cheng, S Ji, J Wang, Y Yu, J Chen
Proceedings of the 44th International Conference on Software Engineering …, 2022
38*2022
MGA: Momentum gradient attack on network
J Chen, Y Chen, H Zheng, S Shen, S Yu, D Zhang, Q Xuan
IEEE Transactions on Computational Social Systems 8 (1), 99-109, 2020
342020
Link prediction adversarial attack
J Chen, Z Shi, Y Wu, X Xu, H Zheng
arXiv preprint arXiv:1810.01110, 2018
342018
N2VSCDNNR: A local recommender system based on node2vec and rich information network
J Chen, Y Wu, L Fan, X Lin, H Zheng, S Yu, Q Xuan
IEEE Transactions on Computational Social Systems 6 (3), 456-466, 2019
332019
DAD-MCNN: DDoS attack detection via multi-channel CNN
J Chen, Y Yang, K Hu, H Zheng, Z Wang
Proceedings of the 2019 11th International Conference on Machine Learning …, 2019
332019
Customizable text generation via conditional text generative adversarial network
J Chen, Y Wu, C Jia, H Zheng, G Huang
Neurocomputing 416, 125-135, 2020
282020
MAG-GAN: Massive attack generator via GAN
J Chen, H Zheng, H Xiong, S Shen, M Su
Information Sciences 536, 67-90, 2020
282020
Graph-fraudster: Adversarial attacks on graph neural network-based vertical federated learning
J Chen, G Huang, H Zheng, S Yu, W Jiang, C Cui
IEEE Transactions on Computational Social Systems 10 (2), 492-506, 2022
272022
FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique
J Chen, H Zheng, H Xiong, R Chen, T Du, Z Hong, S Ji
Computers & Security 104, 102220, 2021
242021
Smoothing adversarial training for GNN
J Chen, X Lin, H Xiong, Y Wu, H Zheng, Q Xuan
IEEE Transactions on Computational Social Systems 8 (3), 618-629, 2020
232020
Invisible poisoning: Highly stealthy targeted poisoning attack
J Chen, H Zheng, M Su, T Du, C Lin, S Ji
Information Security and Cryptology: 15th International Conference, Inscrypt …, 2020
222020
Deeppoison: Feature transfer based stealthy poisoning attack for dnns
J Chen, L Zhang, H Zheng, X Wang, Z Ming
IEEE Transactions on Circuits and Systems II: Express Briefs 68 (7), 2618-2622, 2021
212021
Generative dynamic link prediction
J Chen, X Lin, C Jia, Y Li, Y Wu, H Zheng, Y Liu
Chaos: An Interdisciplinary Journal of Nonlinear Science 29 (12), 2019
192019
Grip-gan: An attack-free defense through general robust inverse perturbation
H Zheng, J Chen, H Du, W Zhu, S Ji, X Zhang
IEEE Transactions on Dependable and Secure Computing 19 (6), 4204-4224, 2021
182021
GAIL-PT: An intelligent penetration testing framework with generative adversarial imitation learning
J Chen, S Hu, H Zheng, C Xing, G Zhang
Computers & Security 126, 103055, 2023
15*2023
RCA-SOC: A novel adversarial defense by refocusing on critical areas and strengthening object contours
J Chen, H Zheng, R Chen, H Xiong
Computers & Security 96, 101916, 2020
132020
The system can't perform the operation now. Try again later.
Articles 1–20