default search action
Jinyu Tian
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Bo Sun, Jinyu Tian, Yong Wu, Lunjun Yu, Yuanyan Tang:
Structured Encoding Based on Semantic Disambiguation for Video Captioning. Cogn. Comput. 16(3): 1032-1048 (2024) - [j18]Yong Wu, Jinyu Tian, Huijun Liu, Yuanyan Tang:
A dense video caption dataset of student classroom behaviors and a baseline model with boundary semantic awareness. Displays 84: 102804 (2024) - [j17]Yuanman Li, Minhua Liu, Jinyu Tian, Jie Du, Xia Li:
Operation History Estimation and Its Application to Multi-Degraded Image Restoration. IEEE Trans. Consumer Electron. 70(1): 863-875 (2024) - [j16]Yuanman Li, Liangpei Hu, Li Dong, Haiwei Wu, Jinyu Tian, Jiantao Zhou, Xia Li:
Transformer-Based Image Inpainting Detection via Label Decoupling and Constrained Adversarial Training. IEEE Trans. Circuits Syst. Video Technol. 34(3): 1857-1872 (2024) - [j15]Haiwei Wu, Jiantao Zhou, Xinyu Zhang, Jinyu Tian, Weiwei Sun:
Robust Camera Model Identification Over Online Social Network Shared Images via Multi-Scenario Learning. IEEE Trans. Inf. Forensics Secur. 19: 148-162 (2024) - [j14]Jun Liu, Jiantao Zhou, Haiwei Wu, Weiwei Sun, Jinyu Tian:
Generating Robust Adversarial Examples against Online Social Networks (OSNs). ACM Trans. Multim. Comput. Commun. Appl. 20(4): 98:1-98:26 (2024) - [j13]Jun Liu, Jiantao Zhou, Jinyu Tian, Weiwei Sun:
Recoverable Privacy-Preserving Image Classification through Noise-like Adversarial Examples. ACM Trans. Multim. Comput. Commun. Appl. 20(7): 216:1-216:27 (2024) - [c19]Jun Liu, Jiantao Zhou, Jiandian Zeng, Jinyu Tian:
DifAttack: Query-Efficient Black-Box Adversarial Attack via Disentangled Feature Space. AAAI 2024: 3666-3674 - [c18]Fengpeng Li, Kemou Li, Jinyu Tian, Jiantao Zhou:
Regroup Median Loss for Combating Label Noise. AAAI 2024: 13474-13482 - [i13]Jun Liu, Jiantao Zhou, Jiandian Zeng, Jinyu Tian, Zheng Li:
DifAttack++: Query-Efficient Black-Box Adversarial Attack via Hierarchical Disentangled Feature Space in Cross-Domain. CoRR abs/2406.03017 (2024) - [i12]Penghai Zhao, Qinghua Xing, Kairan Dou, Jinyu Tian, Ying Tai, Jian Yang, Ming-Ming Cheng, Xiang Li:
From Words to Worth: Newborn Article Impact Prediction with LLM. CoRR abs/2408.03934 (2024) - [i11]Qi Dong, Rubing Huang, Chenhui Cui, Dave Towey, Ling Zhou, Jinyu Tian, Jianzhou Wang:
Short-Term Electricity-Load Forecasting by Deep Learning: A Comprehensive Survey. CoRR abs/2408.16202 (2024) - 2023
- [j12]Xingrun Wang, Xiaochen Yuan, Mianjie Li, Ying Sun, Jinyu Tian, Hongfei Guo, Jianqing Li:
Parallel multiple watermarking using adaptive Inter-Block correlation. Expert Syst. Appl. 213(Part): 119011 (2023) - [j11]Tingting Wang, Kai Fang, Wei Wei, Jinyu Tian, Yuanyuan Pan, Jianqing Li:
Microcontroller Unit Chip Temperature Fingerprint Informed Machine Learning for IIoT Intrusion Detection. IEEE Trans. Ind. Informatics 19(2): 2219-2227 (2023) - [j10]Qifeng Lai, Jinyu Tian, Wei Wang, Xiping Hu:
Spatial-Temporal Attention Graph Convolution Network on Edge Cloud for Traffic Flow Prediction. IEEE Trans. Intell. Transp. Syst. 24(4): 4565-4576 (2023) - [j9]Jinyu Tian, Jiantao Zhou, Jia Duan:
Hierarchical Services of Convolutional Neural Networks via Probabilistic Selective Encryption. IEEE Trans. Serv. Comput. 16(1): 343-355 (2023) - [c17]Jiale Chen, Xiaojian Ji, Li Dong, Rangding Wang, Diqun Yan, Jinyu Tian:
Physically Robust Reversible Watermarking. AMC-SME 2023: 37-43 - [c16]Yiming Chen, Jinyu Tian, Xiangyu Chen, Jiantao Zhou:
Effective Ambiguity Attack Against Passport-based DNN Intellectual Property Protection Schemes through Fully Connected Layer Substitution. CVPR 2023: 8123-8132 - [c15]Xiaojian Ji, Li Dong, Rangding Wang, Diqun Yan, Yang Yin, Jinyu Tian:
Gradient Sign Inversion: Making an Adversarial Attack a Good Defense. IJCNN 2023: 1-6 - [c14]Jiacheng Deng, Li Dong, Jiahao Chen, Diqun Yan, Rangding Wang, Dengpan Ye, Lingchen Zhao, Jinyu Tian:
Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition. ACM Multimedia 2023: 7559-7568 - [i10]Yiming Chen, Jinyu Tian, Xiangyu Chen, Jiantao Zhou:
Effective Ambiguity Attack Against Passport-based DNN Intellectual Property Protection Schemes through Fully Connected Layer Substitution. CoRR abs/2303.11595 (2023) - [i9]Jiacheng Deng, Li Dong, Jiahao Chen, Diqun Yan, Rangding Wang, Dengpan Ye, Lingchen Zhao, Jinyu Tian:
Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition. CoRR abs/2308.02369 (2023) - [i8]Jun Liu, Jiantao Zhou, Jiandian Zeng, Jinyu Tian:
DifAttack: Query-Efficient Black-Box Attack via Disentangled Feature Space. CoRR abs/2309.14585 (2023) - [i7]Jun Liu, Jiantao Zhou, Jinyu Tian, Weiwei Sun:
Recoverable Privacy-Preserving Image Classification through Noise-like Adversarial Examples. CoRR abs/2310.12707 (2023) - [i6]Jun Liu, Jiantao Zhou, Haiwei Wu, Weiwei Sun, Jinyu Tian:
Generating Robust Adversarial Examples against Online Social Networks (OSNs). CoRR abs/2310.12708 (2023) - [i5]Fengpeng Li, Kemou Li, Jinyu Tian, Jiantao Zhou:
Regroup Median Loss for Combating Label Noise. CoRR abs/2312.06273 (2023) - 2022
- [j8]Yuanman Li, Jiantao Zhou, Junyang Chen, Jinyu Tian, Li Dong, Xia Li:
Robust Matrix Factorization via Minimum Weighted Error Entropy Criterion. IEEE Trans. Comput. Soc. Syst. 9(6): 1830-1841 (2022) - [j7]Haiwei Wu, Jiantao Zhou, Jinyu Tian, Jun Liu, Yu Qiao:
Robust Image Forgery Detection Against Transmission Over Online Social Networks. IEEE Trans. Inf. Forensics Secur. 17: 443-456 (2022) - [j6]Yuanman Li, Jiantao Zhou, Jinyu Tian, Xianwei Zheng, Yuan Yan Tang:
Weighted Error Entropy-Based Information Theoretic Learning for Robust Subspace Representation. IEEE Trans. Neural Networks Learn. Syst. 33(9): 4228-4242 (2022) - [c13]Haiwei Wu, Jiantao Zhou, Jinyu Tian, Jun Liu:
Robust Image Forgery Detection over Online Social Network Shared Images. CVPR 2022: 13430-13439 - [c12]Chuda Xiao, Zhuo Chen, Haoyu Li, Dan Li, Rashid Khan, Jinyu Tian, Weiguo Xie, Liyilei Su:
Semi-supervised 3D U-Net Learning Based on Meta Pseudo Labels. FLARE@MICCAI 2022: 214-222 - [c11]Zhaoxi Zhang, Leo Yu Zhang, Xufei Zheng, Jinyu Tian, Jiantao Zhou:
Self-Supervised Adversarial Example Detection by Disentangled Representation. TrustCom 2022: 1000-1007 - [i4]Haiwei Wu, Jiantao Zhou, Shile Zhang, Jinyu Tian:
Exploring Spatial-Temporal Features for Deepfake Detection and Localization. CoRR abs/2210.15872 (2022) - 2021
- [j5]Weiwei Sun, Jiantao Zhou, Li Dong, Jinyu Tian, Jun Liu:
Optimal Pre-Filtering for Improving Facebook Shared Images. IEEE Trans. Image Process. 30: 6292-6306 (2021) - [c10]Jinyu Tian, Jiantao Zhou, Yuanman Li, Jia Duan:
Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain. AAAI 2021: 9877-9885 - [c9]Jinyu Tian, Jiantao Zhou, Jia Duan:
Probabilistic Selective Encryption of Convolutional Neural Networks for Hierarchical Services. CVPR 2021: 2205-2214 - [c8]Jinyu Tian, Jing Qin, Li-Ming Chen, Hui Fang, Zumin Wang:
A Novel Method for Network Traffic Prediction Using Residual Mogrifier GRU. SERVICES 2021: 47-53 - [i3]Jinyu Tian, Jiantao Zhou, Yuanman Li, Jia Duan:
Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain. CoRR abs/2103.04302 (2021) - [i2]Zhaoxi Zhang, Leo Yu Zhang, Xufei Zheng, Shengshan Hu, Jinyu Tian, Jiantao Zhou:
Self-Supervised Adversarial Example Detection by Disentangled Representation. CoRR abs/2105.03689 (2021) - [i1]Jinyu Tian, Jiantao Zhou, Jia Duan:
Probabilistic Selective Encryption of Convolutional Neural Networks for Hierarchical Services. CoRR abs/2105.12344 (2021) - 2020
- [j4]Chuangchuang Wang, Ping He, Heng Li, Jinyu Tian, Kuiyang Wang, Yangmin Li:
Noise-tolerance consensus formation control for multi-robotic networks. Trans. Inst. Meas. Control 42(8): 1569-1581 (2020)
2010 – 2019
- 2019
- [j3]Anyong Qin, Zhaowei Shang, Jinyu Tian, Yulong Wang, Taiping Zhang, Yuan Yan Tang:
Spectral-Spatial Graph Convolutional Networks for Semisupervised Hyperspectral Image Classification. IEEE Geosci. Remote. Sens. Lett. 16(2): 241-245 (2019) - [c7]Yuanman Li, Jiantao Zhou, Xianwei Zheng, Jinyu Tian, Yuan Yan Tang:
Robust Subspace Clustering With Independent and Piecewise Identically Distributed Noise Modeling. CVPR 2019: 8720-8729 - [c6]Yin-Ping Zhao, Xiliang Lu, Long Chen, Jinyu Tian, C. L. Philip Chen:
Robust Nonconvex Nonnegative Low-rank Representation. iFUZZY 2019: 226-231 - 2018
- [j2]Anyong Qin, Zhaowei Shang, Jinyu Tian, Taiping Zhang, Yuan Yan Tang, Jiye Qian:
Edge-Smoothing-Based Distribution Preserving Hyperspherical Embedding for Hyperspectral Image Classification. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 11(7): 2501-2512 (2018) - 2017
- [j1]Jinyu Tian, Taiping Zhang, Anyong Qin, Zhaowei Shang, Yuan Yan Tang:
Learning the Distribution Preserving Semantic Subspace for Clustering. IEEE Trans. Image Process. 26(12): 5950-5965 (2017) - [c5]Anyong Qin, Zhaowei Shang, Jinyu Tian, Taiping Zhang, Yulong Wang, Yuanyan Tang:
Using Graph-Based Ensemble Learning to Classify Imbalanced Data. CYBCONF 2017: 1-6 - [c4]Anyong Qin, Zhaowei Shang, Jinyu Tian, Ailin Li, Yulong Wang, Yuan Yan Tang:
Maximum correntropy criterion for convex anc semi-nonnegative matrix factorization. SMC 2017: 1856-1861
2000 – 2009
- 2009
- [c3]Jinyu Tian, Yan Lin:
Research on the Electric Power Enterprise Performance Evaluation Based on Symbiosis Theory. WKDD 2009: 64-67 - [c2]Jinyu Tian, Yan Lin:
Short-Term Electricity Price Forecasting Based on Rough Sets and Improved SVM. WKDD 2009: 68-71 - 2008
- [c1]Jinyu Tian, Jianhong Ma:
Study of Security Investment Optimizing Combination Based on PSACO. ISIP 2008: 710-714
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint