default search action
Xingyuan Chen
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Shushan Zhu, Limin Ma, Xingyuan Chen:
Research on the Generation and Automatic Detection of Chinese Academic Writing. IEEE Access 12: 160625-160635 (2024) - [j36]Haodong Sun, Zhi Yang, Xingyuan Chen, Hang Xu, Zhanhui Yuan:
Hardware information flow tracking based on lightweight path awareness. Comput. Secur. 147: 104072 (2024) - [j35]Ruoxi Qin, Linyuan Wang, Xuehui Du, Jian Chen, Xingyuan Chen, Bin Yan:
Adversarial robust decision-making under uncertainty learning and dynamic ensemble selection. Eng. Appl. Artif. Intell. 135: 108653 (2024) - [j34]Faria Tuz Zahura, Gautam Bisht, Zhi Li, Sarah McKnight, Xingyuan Chen:
Impact of topography and climate on post-fire vegetation recovery across different burn severity and land cover types through random forest. Ecol. Informatics 82: 102757 (2024) - [j33]Xingyuan Chen, Yong Deng:
Evidential software risk assessment model on ordered frame of discernment. Expert Syst. Appl. 250: 123786 (2024) - [j32]Yueyuan Li, Songan Zhang, Mingyang Jiang, Xingyuan Chen, Jing Yang, Yeqiang Qian, Chunxiang Wang, Ming Yang:
Tactics2D: A Highly Modular and Extensible Simulator for Driving Decision-Making. IEEE Trans. Intell. Veh. 9(5): 4840-4844 (2024) - [c34]Lingjiao Xu, Xingyuan Chen, Bing Wang, Peng Jin:
Exploring Language Diversity to Improve Neural Text Generation. KSEM (5) 2024: 245-254 - [c33]Yuying Xie, Huahu Xu, Xingyuan Chen, Yuzhe Huang:
A Meta-learning Method for Generalizable Face Forgery Detection. PRICAI (3) 2024: 360-366 - [c32]Xingyuan Chen, Berkay Özbek, Peilong Feng, Timothy G. Constandinou:
A Reconfigurable High-Efficiency All-PMOS Charge Pump with Dual-Phase Clock Scheme. PRIME 2024: 1-4 - [c31]Hanyang Zhuang, Xingyuan Chen, Jianglin Lan, Ying Wang, Zhaoxuan Lu, Chunxiang Wang, Ming Yang:
A Real-time Framework of Multi-Camera Vehicle Tracking System. RCAR 2024: 149-154 - [i16]Weihao Yan, Yeqiang Qian, Xingyuan Chen, Hanyang Zhuang, Chunxiang Wang, Ming Yang:
SAM4UDASS: When SAM Meets Unsupervised Domain Adaptive Semantic Segmentation in Intelligent Vehicles. CoRR abs/2401.08604 (2024) - [i15]Xingyuan Chen, Gonçalo Dos Reis, Wolfgang Stockinger, Zac Wilde:
Improved weak convergence for the long time simulation of Mean-field Langevin equations. CoRR abs/2405.01346 (2024) - [i14]Xingyuan Chen, Wenwei Kuang, Lei Deng, Wei Han, Bo Bai, Gonçalo Dos Reis:
A Mean Field Ansatz for Zero-Shot Weight Transfer. CoRR abs/2408.08681 (2024) - 2023
- [j31]Yuanzhao Gao, Xingyuan Chen, Binglong Li, Xuehui Du:
A Near Real-Time Big Data Provenance Generation Method Based on the Conjoint Analysis of Heterogeneous Logs. IEEE Access 11: 80806-80821 (2023) - [j30]Ruoxi Qin, Linyuan Wang, Xuehui Du, Shuxiao Ma, Xingyuan Chen, Bin Yan:
An adversarial transferability metric based on SVD of Jacobians to disentangle the correlation with robustness. Appl. Intell. 53(10): 11636-11653 (2023) - [j29]Ruoxi Qin, Linyuan Wang, Xuehui Du, Pengfei Xie, Xingyuan Chen, Bin Yan:
Adversarial robustness in deep neural networks based on variable attributes of the stochastic ensemble model. Frontiers Neurorobotics 17 (2023) - [j28]Xingyuan Chen, Yong Deng:
A new belief entropy and its application in software risk analysis. Int. J. Comput. Commun. Control 18(2) (2023) - [j27]Xingyuan Chen, Yong Deng:
A novel combination rule for conflict management in data fusion. Soft Comput. 27(22): 16483-16492 (2023) - [c30]Bing Xu, Xingyuan Chen, Yuan A, Zhenting Chen:
Epidemic Prediction Algorithm Based on Deep Learning and Epidemic Dynamics. ICMLCA 2023: 1021-1026 - [i13]Xingyuan Chen, Gonçalo Dos Reis, Wolfgang Stockinger:
Wellposedness, exponential ergodicity and numerical approximation of fully super-linear McKean-Vlasov SDEs and associated particle systems. CoRR abs/2302.05133 (2023) - [i12]Ruoxi Qin, Linyuan Wang, Xuehui Du, Xingyuan Chen, Bin Yan:
Dynamic ensemble selection based on Deep Neural Network Uncertainty Estimation for Adversarial Robustness. CoRR abs/2308.00346 (2023) - [i11]Francisco Bernal, Xingyuan Chen, Gonçalo Dos Reis:
An iterative method for Helmholtz boundary value problems arising in wave propagation. CoRR abs/2308.11469 (2023) - [i10]Yueyuan Li, Songan Zhang, Mingyang Jiang, Xingyuan Chen, Ming Yang:
Tactics2D: A Multi-agent Reinforcement Learning Environment for Driving Decision-making. CoRR abs/2311.11058 (2023) - 2022
- [j26]Xingyuan Chen, Gonçalo Dos Reis:
A flexible split-step scheme for solving McKean-Vlasov stochastic differential equations. Appl. Math. Comput. 427: 127180 (2022) - [j25]Xingyuan Chen, Peng Jin, Ping Cai, Hongjun Wang, Xinyu Dai, Jiajun Chen:
The detection of distributional discrepancy for language GANs. Connect. Sci. 34(1): 1736-1750 (2022) - [j24]Maegen B. Simmonds, William J. Riley, Deborah A. Agarwal, Xingyuan Chen, Shreyas Cholia, Robert Crystal-Ornelas, Ethan T. Coon, Dipankar Dwivedi, Valerie C. Hendrix, Maoyi Huang, Ahmad Jan, Zarine Kakalia, Jitendra Kumar, Charles D. Koven, Li Li, Mario Melara, Lavanya Ramakrishnan, Daniel M. Ricciuto, Anthony P. Walker, Wei Zhi, Qing Zhu, Charuleka Varadharajan:
Guidelines for Publicly Archiving Terrestrial Model Data to Enhance Usability, Intercomparison, and Synthesis. Data Sci. J. 21(1): 3 (2022) - [j23]Jingyu Yao, Wenping Yuan, Zhongming Gao, Heping Liu, Xingyuan Chen, Yongjing Ma, Evan Arntzen, Douglas McFarland:
Impact of Shifts in Vegetation Phenology on the Carbon Balance of a Semiarid Sagebrush Ecosystem. Remote. Sens. 14(23): 5924 (2022) - [c29]Lingjiao Xu, Xingyuan Chen, Bing Wang, Peng Jin:
A primary study on diversity of question generation. CIS 2022: 166-170 - [c28]Xia Yang, Siyuan Jing, Xingyuan Chen, Peng Jin:
Corpus Construction for Generating Knowledge Graph of Sichuan Cuisine. CLSW (2) 2022: 34-42 - [c27]Zhi Yang, Zhanhui Yuan, Shuyuan Jin, Xingyuan Chen, Lei Sun, Xuehui Du, Wenfa Li, Hongqi Zhang:
FSAFlow: Lightweight and Fast Dynamic Path Tracking and Control for Privacy Protection on Android Using Hybrid Analysis with State-Reduction Strategy. SP 2022: 2114-2129 - [i9]Mohammad A. Moghaddam, Ty Paul Andrew Ferré, Xingyuan Chen, Kewei Chen, Mohammad Reza Ehsani:
Application of Machine Learning Methods in Inferring Surface Water Groundwater Exchanges using High Temporal Resolution Temperature Measurements. CoRR abs/2201.00726 (2022) - [i8]Xingyuan Chen, Gonçalo Dos Reis:
Euler simulation of interacting particle systems and McKean-Vlasov SDEs with fully superlinear growth drifts in space and interaction. CoRR abs/2208.12772 (2022) - 2021
- [j22]Zhao Zhang, Zhi Yang, Xuehui Du, Wenfa Li, Xingyuan Chen, Lei Sun:
Tenant-Led Ciphertext Information Flow Control for Cloud Virtual Machines. IEEE Access 9: 15156-15169 (2021) - [j21]Xingyuan Chen, Peng Jin, Yanzhe Li, Jiuhua Zhang, Xinyu Dai, Jiajun Chen:
Adversarial subsequences for unconditional text generation. Comput. Speech Lang. 70: 101242 (2021) - [j20]Runjian Wu, Xingyuan Chen, Glenn Hammond, Gautam Bisht, Xuehang Song, Maoyi Huang, Guo-Yue Niu, Ty Paul Andrew Ferré:
Coupling surface flow with high-performance subsurface reactive flow and transport code PFLOTRAN. Environ. Model. Softw. 137: 104959 (2021) - [j19]Peishi Jiang, Xingyuan Chen, Kewei Chen, Jeffrey Anderson, Nancy Collins, Mohamad E. Gharamti:
DART-PFLOTRAN: An ensemble-based data assimilation system for estimating subsurface flow and transport model parameters. Environ. Model. Softw. 142: 105074 (2021) - [j18]Xingyuan Chen, Huahu Xu, Yang Li, Minjie Bian:
Person Re-Identification by Low-Dimensional Features and Metric Learning. Future Internet 13(11): 289 (2021) - [j17]Ping Cai, Xingyuan Chen, Peng Jin, Hongjun Wang, Tianrui Li:
Distributional discrepancy: A metric for unconditional text generation. Knowl. Based Syst. 217: 106850 (2021) - [c26]Peng Jin, Lingjiao Xu, Bing Wang, Xingyuan Chen:
Dropout Token To Improve Neural Language Model. CIS 2021: 90-93 - [c25]Limin Ma, Xingyuan Chen, Bin Wang, Peng Jin:
Gradient-based Dynamic Dropout. CIS 2021: 137-140 - [i7]Ruoxi Qin, Linyuan Wang, Xingyuan Chen, Xuehui Du, Bin Yan:
Dynamic Defense Approach for Adversarial Robustness in Deep Neural Networks via Stochastic Ensemble Smoothed Model. CoRR abs/2105.02803 (2021) - [i6]Xingyuan Chen, Gonçalo Dos Reis:
A flexible split-step scheme for MV-SDEs. CoRR abs/2105.09688 (2021) - 2020
- [j16]Yuanzhao Gao, Xingyuan Chen, Xuehui Du:
A Big Data Provenance Model for Data Security Supervision Based on PROV-DM Model. IEEE Access 8: 38742-38752 (2020) - [j15]Yi Sun, Qian Liu, Xingyuan Chen, Xuehui Du:
An Adaptive Authenticated Data Structure With Privacy-Preserving for Big Data Stream in Cloud. IEEE Trans. Inf. Forensics Secur. 15: 3295-3310 (2020) - [c24]Ping Cai, Xingyuan Chen, Hongjun Wang, Peng Jin:
The errors analysis of natural language generation - A case study of Topic-to-Essay generation. CIS 2020: 86-89 - [i5]Xingyuan Chen, Ping Cai, Peng Jin, Hongjun Wang, Xinyu Dai, Jiajun Chen:
A Discriminator Improves Unconditional Text Generation without Updating the Generator. CoRR abs/2004.02135 (2020) - [i4]Ping Cai, Xingyuan Chen, Peng Jin, Hongjun Wang, Tianrui Li:
Distributional Discrepancy: A Metric for Unconditional Text Generation. CoRR abs/2005.01282 (2020)
2010 – 2019
- 2019
- [j14]Zezhi Wu, Xingyuan Chen, Zhi Yang, Xuehui Du:
Reducing Security Risks of Suspicious Data and Codes Through a Novel Dynamic Defense Model. IEEE Trans. Inf. Forensics Secur. 14(9): 2427-2440 (2019) - [c23]Yanchun Zhang, Xingyuan Chen, Peng Jin, Yajun Du:
Exploring Context's Diversity to Improve Neural Language Model. IALP 2019: 419-423 - [i3]Xingyuan Chen, Yanzhe Li, Peng Jin, Jiuhua Zhang, Xinyu Dai, Jiajun Chen, Gang Song:
Adversarial Sub-sequence for Text Generation. CoRR abs/1905.12835 (2019) - [i2]Xingyuan Chen, Ping Cai, Peng Jin, Haokun Du, Hongjun Wang, Xingyu Dai, Jiajun Chen:
The Detection of Distributional Discrepancy for Text Generation. CoRR abs/1910.04859 (2019) - 2018
- [j13]Yan Yang, Xingyuan Chen, Hao Chen, Xuehui Du:
Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing. IEEE Access 6: 18009-18021 (2018) - [j12]Zezhi Wu, Xingyuan Chen, Xuehui Du, Zhi Yang:
CDroid: practically implementation a formal-analyzed CIFC model on Android. Comput. Secur. 78: 231-244 (2018) - [j11]Shaojun Yu, Li Lin, Yujian Wang, Xingyuan Chen:
Time Synchronization Algorithm for Wireless Sensor Networks Based on Frequency Offset Estimation. Int. J. Online Eng. 14(6): 71-84 (2018) - [i1]Feng Hu, Lucas Lamata, Mikel Sanz, Xi Chen, Xingyuan Chen, Chao Wang, Enrique Solano:
Quantum computing cryptography: Unveiling cryptographic Boolean functions with quantum annealing. CoRR abs/1806.08706 (2018) - 2017
- [j10]Timothy C. Johnson, Glenn Hammond, Xingyuan Chen:
PFLOTRAN-E4D: A parallel open source PFLOTRAN module for simulating time-lapse electrical resistivity data. Comput. Geosci. 99: 72-80 (2017) - [j9]Yi Sun, Xingyuan Chen, Xuehui Du, Jian Xu:
Dynamic authenticated data structures with access control for outsourcing data stream. IET Inf. Secur. 11(5): 235-242 (2017) - 2016
- [j8]Zuohui Li, Xingyuan Chen:
素数阶群上具有扩展通配符的ABE方案 (ABE Scheme with Generalized Wildcards on Prime Order Groups). 计算机科学 43(1): 186-190 (2016) - [c22]Si-Yuan Jing, Gaorong Yan, Xingyuan Chen, Peng Jin, Zhaoyi Guo:
Parallel Acceleration of IBM Alignment Model based on Lock-Free Hash Table. CIS 2016: 423-427 - [c21]Xingyuan Chen, Peng Jin, Diana McCarthy, John Carroll:
Integrating Character Representations into Chinese Word Embedding. CLSW 2016: 335-349 - [c20]Peng Jin, Yue Zhang, Xingyuan Chen, Yunqing Xia:
Bag-of-Embeddings for Text Classification. IJCAI 2016: 2824-2830 - [c19]Si-Yuan Jing, Gaorong Yan, Xingyuan Chen, Peng Jin, Zhaoyi Guo:
CUDA-Based Parallel Implementation of IBM Word Alignment Algorithm for Statistical Machine Translation. PDCAT 2016: 189-194 - 2015
- [j7]Liang Chen, Xingyuan Chen, Yi Sun, Xuehui Du:
基于结构路径的恶意PDF文档检测 (Detection of Malicious PDF Based on Structural Path). 计算机科学 42(2): 90-94 (2015) - [j6]Houren Xiong, Xingyuan Chen, Bin Zhang, Yan Yang:
基于RBAC的授权管理安全准则分析与研究 (Security Principles for RBAC-based Authorization Management). 计算机科学 42(3): 117-123 (2015) - [j5]Lipeng Dong, Xingyuan Chen, Yingjie Yang, Wang Shi:
网络隐蔽信道实现机制及检测技术研究 (Implementation and Detection of Network Covert Channel). 计算机科学 42(7): 216-221 (2015) - [j4]Yi Sun, Xingyuan Chen, Xuehui Du, Jian Xu:
可验证授权计算研究综述 (Survey on Verifiable Delegation of Computation). 计算机科学 42(11): 1-7 (2015) - [c18]Xingyuan Chen, Yunqing Xia, Peng Jin, John Carroll:
Dataless Text Classification with Descriptive LDA. AAAI 2015: 2224-2231 - [c17]Timothy D. Scheibe, Xiaofan Yang, Xingyuan Chen, Glenn Hammond:
A Hybrid Multiscale Framework for Subsurface Flow and Transport Simulations. ICCS 2015: 1098-1107 - [c16]Xia Yang, Peng Jin, Xingyuan Chen:
The Construction of a Kind of Chat Corpus in Chinese Word Segmentation. WI-IAT (3) 2015: 168-172 - [c15]Zhaoyi Guo, Xingyuan Chen, Peng Jin, Si-Yuan Jing:
Chinese Spelling Errors Detection Based on CSLM. WI-IAT (3) 2015: 173-176 - 2014
- [j3]Vicky L. Freedman, Xingyuan Chen, Stefan Finsterle, Mark D. Freshley, Ian Gorton, Luke J. Gosink, Elizabeth H. Keating, Carina Lansing, William A. M. Moeglein, Christopher J. Murray, George Shu Heng Pau, Ellen Porter, Sumit Purohit, Mark Rockhold, Karen Schuchardt, Chandrika Sivaramakrishnan, Velimir V. Vesselinov, Scott R. Waichler:
A high-performance workflow system for subsurface simulation. Environ. Model. Softw. 55: 176-189 (2014) - [c14]Houren Xiong, Xingyuan Chen, Bin Zhang, Guangxia Wang:
A finer-grained resource management model oriented to role-based access control. CCIS 2014: 198-206 - [c13]Peng Jin, Xingyuan Chen, Zhaoyi Guo, Pengyuan Liu:
Integrating Pinyin to Improve Spelling Errors Detection for Chinese Language. WI-IAT (2) 2014: 455-458 - 2013
- [j2]Yi Sun, Xingyuan Chen, Xuehui Du:
An Efficient Elliptic Curve Discrete Logarithm based Trapdoor Hash Scheme without Key Exposure. J. Comput. 8(11): 2851-2856 (2013) - [c12]Peng Jin, Xingyuan Chen:
A Word Sense Probabilistic Topic Model. CIS 2013: 401-404 - [c11]Xingyuan Chen, Xia Yang, Bingjun Su:
A Fast Algorithm of Computing Word Similarity. CIS 2013: 405-408 - [c10]Xingyuan Chen, Michael Schäfer, Dieter Bothe:
Numerical Modelling of Viscoelastic Fluid-Structure Interaction and Its Application for a Valveless Micropump. ENUMATH 2013: 717-725 - 2012
- [j1]Zhi Yang, Lihua Yin, Shuyuan Jin, Xingyuan Chen:
Optimal mining on security labels for decentralized information flow control. Comput. Secur. 31(8): 912-924 (2012) - 2011
- [c9]Ning Zhu, Xingyuan Chen, Yongfu Zhang:
Construction of Overflow Attacks Based on Attack Element and Attack Template. CIS 2011: 540-544 - [c8]Xiuqing Mao, Xingyuan Chen, Yingjie Yang, Junfeng Li:
An Improved Framework of Disaster-Tolerance Oriented Adaptive Failure Detection. ISCID (1) 2011: 228-231
2000 – 2009
- 2009
- [c7]Xiangran Cheng, Xingyuan Chen, Bin Zhang, Yan Yang:
An Algebra for Composing Access Control Policies in Grid. CIS (1) 2009: 526-530 - 2008
- [c6]Wu Bei, Xingyuan Chen, Yongliang Wang, Dai Xiangdong, Peng Jun:
Network System Model-Based Multi-level Policy Generation and Representation. CSSE (2) 2008: 283-287 - [c5]Peng Jun, Xingyuan Chen, Wu Bei, Dai Xiangdong, Yongliang Wang:
Policy Monitoring and a Finite State Automata Model. CSSE (2) 2008: 646-649 - [c4]Siyuan Xin, Xingyuan Chen, Huilin Tang, Ning Zhu:
Research on DoS Atomic Attack Oriented to Attack Resistance Test. ICNSC 2008: 1747-1752 - [c3]Yanbin Qian, Xingyuan Chen, Xuehui Du, Hongqi Zhang:
Layered Secure Access Research for Space Network. ISCSCT (1) 2008: 307-311 - [c2]Xiangran Cheng, Xingyuan Chen, Bin Zhang, Yan Yang:
A Novel Trust Collecting Mechanism Based on Publish/Subscribe Scheme in Grid Computing. ISECS 2008: 314-317 - 2007
- [c1]Ting Wang, Xingyuan Chen, Bin Zhang, Lichun Pei:
A Method of Fine-Grained Authorization and Access Control for ASP Pages. CIS 2007: 579-583
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-08 01:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint