关注
Yong Jiang
Yong Jiang
在 sz.tsinghua.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Backdoor learning: A survey
Y Li, Y Jiang, Z Li, ST Xia
IEEE Transactions on Neural Networks and Learning Systems, 2022
1182022
Rethinking the trigger of backdoor attack
Y Li, T Zhai, B Wu, Y Jiang, Z Li, S Xia
arXiv preprint arXiv:2004.04692, 2020
632020
Backpropagation neural network on Markov chains from system call sequences: a new approach for detecting Android malware with system call sequences
X Xiao, Z Wang, Q Li, S Xia, Y Jiang
IET Information Security 11 (1), 8-15, 2017
632017
A large-scale chinese short-text conversation dataset
Y Wang, P Ke, Y Zheng, K Huang, Y Jiang, X Zhu, M Huang
CCF International Conference on Natural Language Processing and Chinese …, 2020
552020
Improving adversarial robustness via channel-wise activation suppressing
Y Bai, Y Zeng, Y Jiang, ST Xia, X Ma, Y Wang
arXiv preprint arXiv:2103.08307, 2021
532021
Towards controller placement for robust software-defined networks
S Guo, S Yang, Q Li, Y Jiang
2015 IEEE 34th international performance computing and communications …, 2015
482015
CenLocShare: A centralized privacy-preserving location-sharing system for mobile online social networks
X Xiao, C Chen, AK Sangaiah, G Hu, R Ye, Y Jiang
Future Generation Computer Systems 86, 863-872, 2018
472018
Deterministic constructions of binary measurement matrices from finite geometry
ST Xia, XJ Liu, Y Jiang, HT Zheng
IEEE Transactions on Signal Processing 63 (4), 1017-1029, 2014
442014
Towards mitigating link flooding attack via incremental SDN deployment
L Wang, Q Li, Y Jiang, J Wu
2016 IEEE Symposium on Computers and Communication (ISCC), 397-402, 2016
422016
CNN–MHSA: A Convolutional Neural Network and multi-head self-attention combined approach for detecting phishing websites
X Xiao, D Zhang, G Hu, Y Jiang, S Xia
Neural Networks 125, 303-312, 2020
412020
Clickbait convolutional neural network
HT Zheng, JY Chen, X Yao, AK Sangaiah, Y Jiang, CZ Zhao
Symmetry 10 (5), 138, 2018
412018
New deep learning method to detect code injection attacks on hybrid applications
R Yan, X Xiao, G Hu, S Peng, Y Jiang
Journal of Systems and Software 137, 67-77, 2018
392018
Woodpecker: Detecting and mitigating link-flooding attacks via SDN
L Wang, Q Li, Y Jiang, X Jia, J Wu
Computer Networks 147, 1-13, 2018
362018
Hilbert-based generative defense for adversarial examples
Y Bai, Y Feng, Y Wang, T Dai, ST Xia, Y Jiang
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2019
352019
One-shot adversarial attacks on visual tracking with dual attention
X Chen, X Yan, F Zheng, Y Jiang, ST Xia, Y Zhao, R Ji
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020
342020
Backdoor attack against speaker verification
T Zhai, Y Li, Z Zhang, B Wu, Y Jiang, ST Xia
ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and …, 2021
292021
Improving query efficiency of black-box adversarial attack
Y Bai, Y Zeng, Y Jiang, Y Wang, ST Xia, W Guo
European Conference on Computer Vision, 101-116, 2020
282020
Intelligent path control for energy-saving in hybrid SDN networks
X Jia, Y Jiang, Z Guo, G Shen, L Wang
Computer networks 131, 65-76, 2018
282018
Identifying Android malware with system call cooccurrence matrices
X Xiao, X Xiao, Y Jiang, X Liu, R Ye
Transactions on Emerging Telecommunications Technologies 27 (5), 675-684, 2016
282016
Affiliation disambiguation for constructing semantic digital libraries
Y Jiang, HT Zheng, X Wang, B Lu, K Wu
Journal of the American Society for Information Science and Technology 62 (6 …, 2011
272011
系统目前无法执行此操作,请稍后再试。
文章 1–20