default search action
Xiaojun Chen 0004
Person information
- affiliation: Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
Other persons with the same name
- Xiaojun Chen — disambiguation page
- Xiaojun Chen 0001 — The Hong Kong Polytechnic University (and 1 more)
- Xiaojun Chen 0002 — China Electronic Systems Engineering Corporation, Beijing, China (and 1 more)
- Xiaojun Chen 0003 — Shanghai Jiao Tong University, School of Mechanical Engineering, China
- Xiaojun Chen 0005 — Affiliated Hospital of Jiangsu University, Zhenjiang, China
- Xiaojun Chen 0006 — Shenzhen University, College of Computer Science and Software, China (and 2 more)
- Xiaojun Chen 0007 — Xi'an University of Technology, School of Computer Science and Engineering, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c63]Xin Zhao, Xiaojun Chen, Xudong Chen, He Li, Tingyu Fan, Zhendong Zhao:
CipherDM: Secure Three-Party Inference for Diffusion Model Sampling. ECCV (71) 2024: 288-305 - [c62]Xudong Chen, Xiaojun Chen, Ye Dong, Weizhan Jing, Tingyu Fan, Qinghui Zhang:
Roger: A Round Optimized GPU-Friendly Secure Inference Framework. ICC 2024: 61-66 - [c61]Tingyu Fan, Xiaojun Chen, Ye Dong, Xudong Chen, Weizhan Jing:
Comet: Communication-Efficient Batch Secure Three-Party Neural Network Inference with Client-Aiding. ICC 2024: 752-757 - [c60]Yunfei Yang, Xiaojun Chen, Yuexin Xuan, Zhendong Zhao:
DualCOS: Query-Efficient Data-Free Model Stealing with Dual Clone Networks and Optimal Samples. ICME 2024: 1-6 - [c59]Bisheng Tang, Xiaojun Chen, Shaopu Wang, Yuexin Xuan, Zhendong Zhao:
Graph Federated Learning with Center Moment Constraints for Node Classification. ICPP Workshops 2024: 86-95 - [c58]Yunfei Yang, Xiaojun Chen, Zhendong Zhao, Yuexin Xuan, Bisheng Tang, Xiaoying Li:
STMS: An Out-Of-Distribution Model Stealing Method Based on Causality. IJCNN 2024: 1-8 - [i9]Bisheng Tang, Xiaojun Chen, Shaopu Wang, Yuexin Xuan, Zhendong Zhao:
Federated Learning with Limited Node Labels. CoRR abs/2406.12435 (2024) - 2023
- [j4]Bisheng Tang, Xiaojun Chen, Shaopu Wang, Yuexin Xuan, Zhendong Zhao:
Generalized heterophily graph data augmentation for node classification. Neural Networks 168: 339-349 (2023) - [j3]Ye Dong, Xiaojun Chen, Xiangfu Song, Kaiyun Li:
FlexBNN: Fast Private Binary Neural Network Inference With Flexible Bit-Width. IEEE Trans. Inf. Forensics Secur. 18: 2382-2397 (2023) - [c57]Xiaoying Li, Xiaojun Chen, Bisheng Tang, Shaopu Wang, Yuexin Xuan, Zhendong Zhao:
Unsupervised Graph Structure-Assisted Personalized Federated Learning. ECAI 2023: 1430-1438 - [c56]Shunan Zang, Chuang Zhang, Jingwen Lin, Xiaojun Chen, Shuai Zhang:
Lightweight Reference-Less Summary Quality Evaluation via Key Feature Extraction. ICANN (8) 2023: 498-510 - [c55]Yuexin Xuan, Xiaojun Chen, Zhendong Zhao, Bisheng Tang, Ye Dong:
Practical and General Backdoor Attacks Against Vertical Federated Learning. ECML/PKDD (2) 2023: 402-417 - [c54]Ye Dong, Xiaojun Chen, Weizhan Jing, Kaiyun Li, Weiping Wang:
Meteor: Improved Secure 3-Party Neural Network Inference with Reducing Online Communication Costs. WWW 2023: 2087-2098 - [i8]Yuexin Xuan, Xiaojun Chen, Zhendong Zhao, Bisheng Tang, Ye Dong:
Practical and General Backdoor Attacks against Vertical Federated Learning. CoRR abs/2306.10746 (2023) - [i7]Ye Dong, Xiaojun Chen, Weizhan Jing, Kaiyun Li, Weiping Wang:
Meteor: Improved Secure 3-Party Neural Network Inference with Reducing Online Communication Costs. IACR Cryptol. ePrint Arch. 2023: 100 (2023) - 2022
- [c53]Yuwei Li, Dakui Wang, Jinqing Li, Yangyang Ding, Xiaojun Chen:
Noise Suppression with Label Graph in Distantly Supervised Relation Extraction. CSCWD 2022: 1143-1148 - [c52]Zhendong Zhao, Xiaojun Chen, Yuexin Xuan, Ye Dong, Dakui Wang, Kaitai Liang:
DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible Perturbation and Latent Representation Constraints. CVPR 2022: 15192-15201 - [c51]Dayin Zhang, Xiaojun Chen, Jinqiao Shi:
An Efficient Federated Convolutional Neural Network Scheme with Differential Privacy. EISA 2022: 173-190 - [c50]Xiaoying Li, Xiaojun Chen, Shaopu Wang, Yangyang Ding, Kaiyun Li:
Multi-initial-Center Federated Learning with Data Distribution Similarity-Aware Constraint. ICA3PP 2022: 752-772 - [c49]Xiaojun Liu, Shunan Zang, Chuang Zhang, Xiaojun Chen, Yangyang Ding:
CLTS+: A New Chinese Long Text Summarization Dataset with Abstractive Summaries. ICANN (1) 2022: 73-84 - [c48]Shunan Zang, Chuang Zhang, Xiaojun Liu, Xiaojun Chen, Peng Zhang, Jie Liu:
NEWSFARM: A Large-Scale Chinese Corpus of Long News Summarization. ICPR 2022: 2260-2272 - [c47]Bisheng Tang, Xiaojun Chen, Dakui Wang, Zhendong Zhao:
KAFNN: A Knowledge Augmentation Framework to Graph Neural Networks. IJCNN 2022: 1-8 - [c46]Bisheng Tang, Xiaojun Chen, Dakui Wang, Zhendong Zhao:
Rethinking the Feature Iteration Process of Graph Convolution Networks. IJCNN 2022: 1-8 - [c45]Yuexin Xuan, Xiaojun Chen, Zhendong Zhao, Yangyang Ding, Jianming Lv:
ACTSS: Input Detection Defense against Backdoor Attacks via Activation Subset Scanning. IJCNN 2022: 1-8 - [c44]Shaopu Wang, Xiaojun Chen, Mengzhen Kou, Jinqiao Shi:
PrUE: Distilling Knowledge from Sparse Teacher Networks. ECML/PKDD (3) 2022: 102-117 - [c43]Shaopu Wang, Xiaoying Li, Jiaxin Zhang, Xiaojun Chen, Jinqiao Shi:
Improved Network Pruning via Similarity-Based Regularization. PRICAI (2) 2022: 416-429 - [i6]Xiaojun Liu, Shunan Zang, Chuang Zhang, Xiaojun Chen, Yangyang Ding:
CLTS+: A New Chinese Long Text Summarization Dataset with Abstractive Summaries. CoRR abs/2206.04253 (2022) - [i5]Shaopu Wang, Xiaojun Chen, Mengzhen Kou, Jinqiao Shi:
PrUE: Distilling Knowledge from Sparse Teacher Networks. CoRR abs/2207.00586 (2022) - 2021
- [j2]Zhendong Zhao, Xiaojun Chen, Dakui Wang, Yuexin Xuan, Gang Xiong:
Robust node embedding against graph structural perturbations. Inf. Sci. 566: 165-177 (2021) - [c42]Ye Dong, Xiaojun Chen, Kaiyun Li, Dakui Wang, Shuai Zeng:
FLOD: Oblivious Defender for Private Byzantine-Robust Federated Learning with Dishonest-Majority. ESORICS (1) 2021: 497-518 - [c41]Jinqing Li, Xiaojun Chen, Dakui Wang, Yuwei Li:
Enhancing Label Representations with Relational Inductive Bias Constraint for Fine-Grained Entity Typing. IJCAI 2021: 3843-3849 - [c40]Dayin Zhang, Xiaojun Chen, Jinqiao Shi, Dakui Wang, Shuai Zeng:
A Differential Privacy Collaborative Deep Learning Algorithm in Pervasive Edge Computing Environment. TrustCom 2021: 347-354 - [i4]Kaiyun Li, Xiaojun Chen, Ye Dong, Peng Zhang, Dakui Wang, Shuai Zeng:
Efficient Byzantine-Resilient Stochastic Gradient Desce. CoRR abs/2108.06658 (2021) - [i3]Ye Dong, Xiaojun Chen, Kaiyun Li, Dakui Wang, Shuai Zeng:
FLOD: Oblivious Defender for Private Byzantine-Robust Federated Learning with Dishonest-Majority. IACR Cryptol. ePrint Arch. 2021: 993 (2021) - 2020
- [j1]Ye Dong, Xiaojun Chen, Liyan Shen, Dakui Wang:
EaSTFLy: Efficient and secure ternary federated learning. Comput. Secur. 94: 101824 (2020) - [c39]Jinqing Li, Dakui Wang, Xiaojun Chen, Pencheng Liao, Shujuan Chen:
A Shared-Word Sensitive Sequence-to-Sequence Features Extractor for Sentences Matching. ECAI 2020: 2070-2077 - [c38]Liyan Shen, Xiaojun Chen, Jinqiao Shi, Ye Dong, Binxing Fang:
An Efficient 3-Party Framework for Privacy-Preserving Neural Network Inference. ESORICS (1) 2020: 419-439 - [c37]Jianming Lv, Chaojie Hu, Yipeng Zhou, Xiaojun Chen:
SoMem: A Self-optimizing Memory Network for Distributed Person Re-identification. ICTAI 2020: 482-487 - [c36]Jinpeng Li, Chuang Zhang, Xiaojun Chen, Yanan Cao, Ruipeng Jia:
Improving Abstractive Summarization with Iterative Representation. IJCNN 2020: 1-8 - [c35]Pengcheng Liao, Chuang Zhang, Xiaojun Chen, Xiaofei Zhou:
Improving Abstractive Text Summarization with History Aggregation. IJCNN 2020: 1-9 - [c34]Wei Hou, Dakui Wang, Xiaojun Chen:
Generate Images with Obfuscated Attributes for Private Image Classification. MMM (2) 2020: 125-135 - [c33]Xiaojun Liu, Chuang Zhang, Xiaojun Chen, Yanan Cao, Jinpeng Li:
CLTS: A New Chinese Long Text Summarization Dataset. NLPCC (1) 2020: 531-542
2010 – 2019
- 2019
- [c32]Hong Ding, Chuang Zhang, Xiaojun Chen:
QOBST: An Adaptable Matching Model for Content-Based Pub/Sub Systems. HPCC/SmartCity/DSS 2019: 1266-1273 - [c31]Liyan Shen, Xiaojun Chen, Jinqiao Shi, Binxing Fang:
A More Efficient Private Set Intersection Protocol Based on Random OT and Balance Hash. ICC 2019: 1-7 - [c30]Ye Dong, Xiaojun Chen, Liyan Shen, Dakui Wang:
Privacy-Preserving Distributed Machine Learning Based on Secret Sharing. ICICS 2019: 684-702 - [c29]Jinpeng Li, Chuang Zhang, Xiaojun Chen, Yanan Cao, Pengcheng Liao, Peng Zhang:
Abstractive Text Summarization with Multi-Head Attention. IJCNN 2019: 1-8 - [c28]Rui Xu, Xiaojun Chen, Jinqiao Shi:
A coarse-grained password model with memorable unit-based recurrent neural networks. SAC 2019: 1890-1897 - [i2]Pengcheng Liao, Chuang Zhang, Xiaojun Chen, Xiaofei Zhou:
Improving Abstractive Text Summarization with History Aggregation. CoRR abs/1912.11046 (2019) - [i1]Ye Dong, Xiaojun Chen, Liyan Shen:
Privacy-Preserving Distributed Machine Learning based on Secret Sharing. IACR Cryptol. ePrint Arch. 2019: 1334 (2019) - 2018
- [c27]Liyan Shen, Xiaojun Chen, Dakui Wang, Binxing Fang, Ye Dong:
Efficient and Private Set Intersection of Human Genomes. BIBM 2018: 761-764 - [c26]Rui Xu, Xiaojun Chen, Xingxing Wang, Jinqiao Shi:
An In-depth Study of Digits in Passwords for Chinese Websites. DSC 2018: 588-595 - [c25]Dayin Zhang, Xiaojun Chen, Dakui Wang, Jinqiao Shi:
A Survey on Collaborative Deep Learning and Privacy-Preserving. DSC 2018: 652-658 - [c24]Hong Ding, Chuang Zhang, Xiaojun Chen, Jinqiao Shi, Wenan Wang:
Cloud-MOM: A Content-Based Real-Time Message-Oriented Middleware for Cloud. HPCC/SmartCity/DSS 2018: 750-757 - [c23]Dongjie Zhang, Zheng Fang, Yanan Cao, Yanbing Liu, Xiaojun Chen, Jianlong Tan:
Attention-Based RNN Model for Joint Extraction of Intent and Word Slot Based on a Tagging Strategy. ICANN (3) 2018: 178-188 - [c22]Kaihang Zhang, Chuang Zhang, Xiaojun Chen, Jianlong Tan:
Automatic Web News Extraction Based on DS Theory Considering Content Topics. ICCS (1) 2018: 194-207 - [c21]Xiaojun Chen, Li Bai, Dakui Wang, Jinqiao Shi:
Improve Word Mover's Distance with Part-of-Speech Tagging. ICPR 2018: 3722-3728 - [c20]Wenan Wang, Chuang Zhang, Xiaojun Chen, Zhao Li, Hong Ding, Xin Wen:
An On-the-Fly Scheduling Strategy for Distributed Stream Processing Platform. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 773-780 - 2017
- [c19]Jianwei Ma, Xiaojun Chen, Rui Xu, Jinqiao Shi:
Implementation and Evaluation of Different Parallel Designs of AES Using CUDA. DSC 2017: 606-614 - [c18]Xiaojie Yu, Xiaojun Chen, Jinqiao Shi, Liyan Shen, Dakui Wang:
Efficient and Scalable Privacy-Preserving Similar Document Detection. GLOBECOM 2017: 1-7 - [c17]Xingxing Wang, Dakui Wang, Xiaojun Chen, Rui Xu, Jinqiao Shi, Li Guo:
Improving Password Guessing Using Byte Pair Encoding. ISC 2017: 254-268 - 2016
- [c16]Rui Xu, Xiaojun Chen, Yingbing Wang, Jinqiao Shi, Haitao Mi:
Memory chunking analysis of numerical password for Chinese websites. MILCOM 2016: 788-793 - 2015
- [c15]Yiguo Pu, Jinqiao Shi, Xiaojun Chen, Li Guo, Tingwen Liu:
Towards misdirected email detection based on multi-attributes. ISCC 2015: 796-802 - 2014
- [c14]Yichen Wei, Xu Fei, Xiaojun Chen, Jinqiao Shi, Sihan Qing:
Winnowing Multihashing Structure with Wildcard Query. APWeb Workshophs 2014: 265-281 - [c13]Rui Zhang, Xiaojun Chen, Jinqiao Shi, Fei Xu, Yiguo Pu:
Detecting Insider Threat Based on Document Access Behavior Analysis. APWeb Workshophs 2014: 376-387 - [c12]Xiaojun Chen, Fei Xu, Rui Xu, Siu-Ming Yiu, Jinqiao Shi:
A practical real-time authentication system with Identity Tracking based on mouse dynamics. INFOCOM Workshops 2014: 121-122 - [c11]Tingwen Liu, Yiguo Pu, Jinqiao Shi, Quangang Li, Xiaojun Chen:
Towards misdirected email detection for preventing information leakage. ISCC 2014: 1-6 - [c10]Yan Chen, Yiguo Pu, Xiaojun Chen, Jinqiao Shi, Xiaojie Yu:
CAS: Content Attribution System for Network Forensics. ISCTCS 2014: 129-136 - [c9]Yichen Wei, Fei Xu, Xiaojun Chen, Yiguo Pu, Jinqiao Shi, Sihan Qing:
Winnowing Double Structure for Wildcard Query in Payload Attribution. ISC 2014: 454-464 - 2013
- [c8]Haoliang Zhang, Jinqiao Shi, Xiaojun Chen:
A Multi-Level Analysis Framework in Network Security Situation Awareness. ITQM 2013: 530-536 - [c7]Yiguo Pu, Xiaojun Chen, Xu Cui, Jinqiao Shi, Li Guo, Cheng Qi:
Data Stolen Trojan Detection based on Network Behaviors. ITQM 2013: 828-835 - [c6]Rui Xu, Xiaojun Chen, Jinqiao Shi:
A Multiple Watermarking Algorithm for Texts Mixed Chinese and English. ITQM 2013: 844-851 - [c5]Cheng Qi, Xiaojun Chen, Cui Xu, Jinqiao Shi, Peipeng Liu:
A Bigram based Real Time DNS Tunnel Detection Approach. ITQM 2013: 852-860 - [c4]Xiaojun Chen, Zicheng Wei, Yiguo Pu, Jinqiao Shi:
A Continuous Re-Authentication Approach Using Ensemble Learning. ITQM 2013: 870-878 - [c3]Fei Xu, Jinqiao Shi, Xiaojun Chen, Kam-Pui Chow:
A Three-Dimensional Evaluation Model for Network Management System. ITQM 2013: 888-892 - 2012
- [c2]Xiaojun Chen, Jinqiao Shi, Yiguo Pu, Haoliang Zhang:
An Intent-Driven Masquerader Detection Framework Based on Data Fusion. ISCTCS 2012: 450-457
2000 – 2009
- 2007
- [c1]Zhibin Zhang, Li Guo, Binxing Fang, Xiaojun Chen:
Parallelizing Protocol Processing on SMT Processor Efficiently: A FSM Decomposition Approach. IPCCC 2007: 348-355
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-17 20:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint