头像
更新时间:2026.03.18
总访问量:10

陈晋音

| 博士 高校教授 博士生导师

单位:

职务:

研究方向:

办公地址: 计算机 A204

办公电话:

电子邮箱: chenjinyin@zjut.edu.cn

手机访问
  • 个人简介

    一、个人简介

    博士,教授,博士生导师,担任中国人工智能协会社会计算与智能专委,是国内外专业领域内多个期刊,如《IEEE Transaction on Dependable and Secure Computing》、《IEEE Transactions on Knowledge and Data Engineering》、《IEEE Transactions on Circuits and Systems-II》、《计算机学报》与《自动化学报》等的期刊审稿人。主持有国家自然科学基金面上与青年项目,浙江省自然科学基金重大青年原创项目、17X基础加强重大课题项目、装备发展预研项目、快速扶持项目等国家级及省部级科研项目多项,入选了浙江省杭州高新区海外高层次人才5050计划项目等,参与了国家工信部2017智能制造宁波市科技创新2025重大专项、国家重点研发计划项目、国家自然科学基金面上项目等多项项目。在Usenix、TIFS、ICSETDSCTKDEECCV、AAAI、IJCAIInformation SciencesComputers & Security、自动化学报、软件学报、通信学报、计算机研究与发展等权威期刊或会议发表研究论文80余篇且被SCI/EI检索。出版《深度学习数据与算法安全及其应用》《Attacks, Defenses and Testing for Deep Learning》等2 部专著,授权100 余项专利,部分专利成功转化。此外,获得3 项省部级一等奖、4 项国际/国内会议最佳论文奖、入选2025 全国高倍引学者、2023 年至2025年连续三年全球前2%顶尖科学家“年度科学影响力排行榜”,并在中国指挥与控制学会、人工智能学会等学术组织担任委员,积极推动AI安全学科的发展。


     

    二、科研工作

    A:主持的国家级及省部级主要科研项目

    1、国家自然科学基金项目:基于神经通路的深度学习模型可解释对抗攻防研究

    2、国家自然科学青年基金项目:基于免疫机制的无线传感器网络攻击协同检测研究与设计

    3、全军共用信息系统装备预研项目:智能系统XX等3项17X基础加强重大项目课题2项、快速扶持项目1

    5、浙江省自然科学基金重大青年原创项目:面向深度模型供应链的安全可信关键技术研究

    6、浙江省自然科学基金项目:深度学习模型的安全防护关键技术研究

    7、浙江省自然科学基金项目:基于流形学习的高维混合型数据流聚类研究与演化分析

    8、浙江省自然科学基金项目:基于人工免疫和移动代理的无线传感器网络轻量级入侵检测研究

      

    B:近期部分论文

    目前在国内外专业领域著名期刊或会议发表学术研究论文80余篇,授权国家发明专利60余项且有20余项已转化,受理专利200余项,主编专著1部、教材1部等。

    1. Zhang Ximing, Chen Jinyin*, Zheng Haibin, Liu Zhengguang, PhyCamo: A Robust Physical Camouflage via Contrastive Learning for Multi-View Physical Adversarial Attack, AAAI 2025

    2. Chen Jinyin, Liao Danxin, Yan Yunjie, Xiang Sheng, Zheng Haibin, Robust Black-box Attack on LiDAR-based Perception in Autonomous Driving, IEEE Transactions on Intelligent Transportation Systems, 2025

    3. Pan Xiaohua, Ye Linhui, Weng Deyu, Chen Jinyin, Yin Jianwei, RTNILM: A Deep Robust Transfer Neural Network for Practical Application of NILM, IEEE Transaction on Industrial Informatics, 2025

    4. 陈若曦,陈晋音*,阳雪燕,郑海斌,纪守领,陈铁明,面向深度学习模型供应链的安全性研究综述,计算机研究与发展,2025

    5. 贾澄钰,陈晋音*,金海波,陈若曦,郑海斌,大语言模型的安全威胁与防御综述,信息安全学报,2025

    6. Chen Jinyin, Cao Zhiqi, Zhang Tianxin, Zheng Haibin, Zheng Yayu*, FairQuanti: Fair Quantification of Deep Neural Networks via Neuron Role Contributions, ACM Transactions on Privacy and Security, 2025

    7. Chen Jinyin, Mu Wenbo, Ma Haonan, Wang Chenyi, Zheng Haibin*, Can Contrastive Learning Always be Trusted? Privacy Leakage Evaluation of Contrastive Learning for Graph Neural Networks, IEEE Transaction on Computational Social Systems, 2025

    8. 项圣,廖丹芯,陈晋音*,郑海斌,基于激光雷达点云的目标检测安全性综述,网络与信息安全学报,2025

    9. Chen Jinyin, Zhang Jian, Z Chen, Ming Du, Xuanqi*, Time-aware Gradient Attack on Dynamic Network Link Prediction, TKDE, 2022 CCF-A

    10. Chen Jinyin, Hu Keke, Software Visualization and Deep Transfer Learning for Effective Software Defect Prediction,ICSE, 2020(CCF-A)

    11. Chen Jinyin, Zheng Haibin, Liu Tao, Liu Jiawei, Cheng Yao, Zhang Xuhong, and Ji Shouling, EdgePro: Edge Deep Learning Model Protection via Neuron Authorization, TDSC, 2024(CCF-A)

    12. Chen Jinyin, Jia Chengyu, Yan Yunjie, Ge Jie, Zheng Haibin, Cheng Yao, A Miss Is as Good as A Mile: Metamorphic Testing Based Precision Analysis for Deep Learning Operators, FSE, 2024(CCF-A)

    13. Zheng Haibin, Chen Zhiqing. Du Tianyu, Zhang Xuhong, Wang Jinyi, Cheng Yao, Ji Shouling,Chen Jinyin*, NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification, ICSE, 2022 CCF-A

    14. Zheng Haibin, Chen Jinyin, Zhu Weipeng, Ji Shouling, Zhang Xuhong*, GRIP-GAN: An Attack-Free Defense through General Robust Inverse Perturbation, TDSC, 2021CCF-A

    15. Chong Fu, Xuhong Zhang, Shouling Ji, Jinyin Chen, Jingzheng Wu, Shanqing Guo, Jun Zhou, Alex X. Liu, and Ting Wang, Label Inference Attacks Against Vertical Federated Learning, USENIX Security 2022.(安全四大)

    16. Chen Jinyin, Ge Jie, Zheng Shilian, Ye Linhui, Zhang Longyuan, Shen Weiguo, Yue Keqiang, Yang Xiaoniu, AIR: Threats of Adversarial Attacks on Deep Learning-Based Information Recovery, IEEE Transaction on Wireless Communication, 2024

    17. Chen Jinyin, Liao Danxin, Zheng Shilian, Ye Linhui, Jia Chengyu, Zheng Haibin, Xiang Sheng, RobustRMC: Robustness Interpretable Deep Neural Network for Radio Modulation Classification, IEEE Transaction on Cognitive Communication Network, 2024

    18. Zheng Haibin, Chen Jinyin*, Jin Haibo, CertiPri: Robust Prioritizing Test Inputs for Deep Neural Networks via Differential Gradient, ASE’23, CCF-A

    19. Chen Jinyin, Hu Shulong, Xing Changyou*, Zhang Guoming, GAIL-PT: A Generic Intelligent Penetration Testing Framework with Generative Adversarial Imitation Learning, Computers&Security. 2023CCF-B

    20. Chen Jinyin, Jia Chenyu, Zheng Haibin*, Xu Xiaodong, Fu Chengbo* Is Multi-Modal Necessarily Better? Robustness Evaluation of Multi-modal Fake News DetectionIEEE Transaction on Network Science and Engineering2023

     

    C:部分专利

    1陈晋音, 郑海斌, 熊晖, 沈诗婧, 苏蒙蒙. 一种具有防御对抗样本攻击功能的深度学习分类方法, 授权, 2020.11.3, 201811138721.3

    2陈晋音, 苏蒙蒙, 徐轩珩, 郑海斌, 林翔, 熊晖, 沈诗婧, 施朝霞, 面向多种对抗图片攻击的协同免疫防御方法, 授权, 2020-9-1, 201810299225.X

    3、陈晋音, 朱伟鹏, 苏蒙蒙, 郑海斌, 沈诗婧, 熊晖, 一种针对单张人脸查询次数受限攻击的防御方法及防御装置, 授权, 2020-12-1, 201910440684.X

    4、陈晋音, 张剑, 宣琦, 徐轩桁, 种基于长短时记忆网络的动态网络结构预测方法, 授权, 2020-12-11, 201811139373.1

    5、陈晋音, 陈一贤, 林翔, 吴洋洋, 一种面向社区发现的网络薄弱节点搜索方法, 授权, 202012-11, 201810474668.8

    6、陈晋音, 沈诗婧, 陈治清, 苏蒙蒙, 郑海斌, 面向车牌识别系统黑盒物理攻击模型的防御方法及装置, 授权, 2020-12-11, 201910439878.8

    三、研究生培养等教学情况

    已指导研究生50余名,其中1人获得包括省级优秀学位论文、10人获得校级优秀毕业论文、20余人获省级优秀毕业生与校级优秀毕业生称号等荣誉,指导学生获得全国电子商务竞赛一等奖、中国研究生智慧城市技术与创意设计大赛全国一等奖等,大部分毕业生首次就业便进入国内外著名高校进一步深造或到政府部门、银行、领域内顶级外企及国内互联网大厂等单位工作。出版专著:《深度学习安全及其应用》、《Deep Leanring Security》等。承担包括《C++程序设计》、《数据结构》、《Java程序设计》、《现代智能信息处理》、《大数据》、《程序设计课程设计》等本科生与研究生授课工作。

     

     

    欢迎有志于从事AI应用与安全、图数据挖掘、智能计算等领域的考生报考,联系方式:chenjinyin@zjut.edu.cn

    · 

     


  • 科研项目

    1. 浙江省自然科学基金委员会, 重大青年原创项目, LDQ23F020001, 面向深度模型供应链的安全可信关键技术研究, 2023-01 至 2025-12, 100万元, 结题, 主持

    2.国家自然科学青年基金项目,61502423,基于免疫机制的无线传感器网络攻击协同检测研究与设计,2016/01-2018/1220万元,结题,主持。

    3. 国家自然科学面上基金项目,61973273,基于机器学习的网络结构知识发现和隐匿研究,2020/01-2023/1260万元,结题,参与。

    4. 国家重点研发计划项目,面向不确定复杂环境的博弈动力学机制与智能模型,2018AAA01008012020/01-2023/12178万元,在研,参与。

    5. 浙江省自然科学基金项目,Y19F020085,深度学习模型的安全防护关键技术研究,2019/01-2021/1210万元,在研,主持。

    6. 浙江省自然科学基金项目,LY14F020022,基于流形学习的高维混合型数据流聚类研究与演化分析,2014/01-2016/128万元,结题,主持。

    7. 浙江省自然科学基金项目,Y1100378,基于人工免疫和移动代理的无线传感器网络轻量级入侵检测研究,2010/06-2012/0610万元,结题,主持。

    8. 宁波市科技创新2025重大专项,D103019496,人机物融合智能图像识别算法集成与应用,2019/01-2020/12200万元,在研,主持。



  • 教学与课程

    《数据结构》

    《Java程序设计》

    《现代智能信息处理》


  • 科研成果

    2026

    [1]    Chen Jinyin, Han Ye, Zheng Haibin, Yang Xing*, UniCamo: A Universal Physical Camouflage for Multispectual Object DetectionICASSP202654

    [2]    Chen Jinyin, Zhang Tianxin, Zhao Xiaoming, Zheng Haibin, Ji Baiyang, LightPro: a light-weighted multi-channel protection for edge-oriented deep learning models, Applied soft computing, 2026110

    [3]    陈晋音,穆文博,郑海斌,基于模体增强对比学习的图神经网络后门防御方法,自动化学报,202614

    [4]    Chen Jinyin, Bai Yang, Ma Minying, Chen Defu, Zheng Yayu, Chen Tieming, Ji Baiyang, Causal Inference-based Collaborative Membership Inference Attack on Federated RecommendationIEEE Transaction on Computational Social Systems, 2026112

    [5]    Zhang Ximin, Chen Jinyin, Zheng Haibin, One Subspace to Fool Them All: A Unified Black-box Attack on Perception Models in Embodied Intelligence, Applied Soft Computing, 2025111日(中科院二区)2026214

    [6]    Haibin Zheng, Xiaojuan Wang, Jinyin Chen*, Hui Xiong,Zhaoyan Ming, MFR: Multi-channel Feature Redistribution for Adversary Detection in Sub-category Classification, IET Information Security202629

    [7]    陈晋音,王泽楷,沈文杰,张甜馨,郑海斌,邱洪君,多模态大模型的偏见及其公平性提升综述,网络与系统安全学报,2026228

    2025年

    [1]    Zhang Ximing, Chen Jinyin*, Zheng Haibin, Liu Zhengguang, PhyCamo: A Robust Physical Camouflage via Contrastive Learning for Multi-View Physical Adversarial Attack, AAAI 25, 2025210

    [2]    Jia Chengyu, Chen Jinyin*, Li Xiaohao, Zheng Haibin*, BallPri: Test Cases Prioritization for Deep Neuron Networks via Tolerant Ball in Variable Space, Automated Software Engineering, 202521

    [3]    Chen Jinyin, Liao Danxin, Yan Yunjie, Xiang Sheng, Zheng Haibin, LiDAttack: Robust Black-Box Attack on LiDAR-Based Object Detection, IEEE Transactions on Intelligent Transportation Systems, 20254

    [4]    Chen Jinyin, Cao Zhiqi, Zhang Tianxin, Zheng Haibin, Zheng Yayu*, FairQuanti: Fair Quantification of Deep Neural Networks via Neuron Role Contributions,ACM Transactions on Privacy and Security, 202555

    [5]    Pan Xiaohua, Ye Linhui, Weng Deyu, Chen Jinyin, Yin Jianwei, RTNILM: A Deep Robust Transfer Neural Network for Practical Application of NILM, IEEE Transaction on Industrial Informatics, 2025. 6

    [6]    Chen Jinyin, Mu Wenbo, Ma Haonan, Wang Chenyi, Zheng Haibin*, Can Contrastive Learning Always be Trusted? Privacy Leakage Evaluation of Contrastive Learning for Graph Neural Networks,IEEE Transactions on Computational Social Systems, 2025820

    [7]    Chen Jinyin, Ao Fanyu, Ma Haonan, DefGCL: Defence-enhanced graph contrastive learning against attribute inference attacks, Applied Soft Computing, 2025914

    [8]    贾澄钰,陈晋音*,金海波,陈若曦,郑海斌,大语言模型的安全威胁与防御综述,信息安全学报,2024627

    [9]    陈若曦,陈晋音,阳雪燕,郑海斌,纪守领,陈铁明,面向深度学习模型供应链的安全性研究综述,计算机研究与发展,20245, 813

    [10]    项圣,廖丹芯,陈晋音*,郑海斌,基于激光雷达点云的目标检测安全性综述,网络与信息安全学报,202521

    [11]    陈晋音,瞿康赟,郑海斌,基于模仿学习的深度强化学习目标轨迹隐私推断攻击,网络与信息安全学报,2025916

    [12]     王小娟,陈晋音,郑海斌,陈靖文,基于对比学习自蒸馏的深度模型水印剔除黑盒攻击,信息安全学报,2025915

    [13]      曹志骐,陈晋音,郑海斌,基于神经元动态约束的隐蔽量化偏见注入方法网络空间安全科学学报,20251130


    2024年

    [1]    Chen Jinyin, Zheng Haibin, Liu Tao, Liu Jiawei, Cheng Yao, Zhang Xuhong, and Ji Shouling, EdgePro: Edge Deep Learning Model Protection via Neuron Authorization, TDSC 2024211

    [2]    Chen Jinyin, Jia Chengyu, Yan Yunjie, Ge Jie, Zheng Haibin, Cheng Yao, A Miss Is as Good as A Mile: Metamorphic Testing Based Precision Analysis for Deep Learning Operators, FSE 2024416

    [3]    Chen Jinyin, Ge Jie, Zheng Shilian, Ye Linhui, Zhang Longyuan, Shen Weiguo, Yue Keqiang, Yang Xiaoniu, AIR: Threats of Adversarial Attacks on Deep Learning-Based Information Recovery, IEEE Transaction on Wireless Communication, 202434

    [4]    Chen Jinyin, Liao Danxin, Zheng Shilian, Ye Linhui, Jia Chengyu, Zheng Haibin, Xiang Sheng, RobustRMC: Robustness Interpretable Deep Neural Network for Radio Modulation Classification, IEEE Transaction on Cognitive Communication Network, 20243

    [5]    Chen Jinyin, Li Mingjun, Liu Tao, Zheng Haibin, Du Hang*, Rethinking the Defense Against Free-rider Attack from the Perspective of Model Weight Evolving Frequency, Information Sciences. 2024325日。

    [6]    Chen Jinyin, Zhao Xiaoming, Li Xiao, Zheng Haibin, Xiang Sheng, Guo Haifeng, Robust Knowledge Distillation Based on Feature Variance for Backdoored Teacher Model, Applied Soft Computing, 2024620

    [7]    Chen Ruoxi, Jin Haibo, Chen Jinyin*, Zheng Haibin, Fight Perturbations with Perturbations: Defending Adversarial Attacks via Neuron Influence, TDSC20248

    [8]    Jia Chenyu, Chen Jinyin, Ji Shouling, Cheng Yao, Zheng Haibin, Xuan Qi, Backdoor Online Tracing with Evolving Graphs, TIFS2024105

    [9]    陈晋音,赵晓明,郑海斌,郭海锋,基于光学的物理域对抗攻击综述,网络与信息安全学报,202425

    [10]   Jin Haibo, Chen Jinyin, Ming Zhaoyan, Zheng Haibin, Yu Yue, CatchBackdoor: Backdoor Detection via Critical Trojan Neural Path FuzzingECCV 2024, 20247

    [11]    Chen Ruoxi, Chen Jinyin, Jin Haibo, EditShield: Protecting Unauthorized Image Editing by Instruction-guided Diffusion Models, ECCV 2024, 20247

    [12]            Chen Jinyin*, Cao Zhiqi, Chen Ruoxi, Li Xiao, Zheng Haibin, Xuan Qi. Like Teacher, Like Pupil: Transferring Backdoors via Feature-based Knowledge Distillation, Computers&Security, 2024.8

    [13]            Zheng Haibin, Chen Jinyin, Liu Tao, Zhang Xuhong, Chen Yao, Ji Shouling, DP-Poison: Poisoning Federated Learning under Cover of Differential Privacy, ACM Transactions on Transactions on Privacy and Security20241024



    2023年

    [1]   Zheng Haibin, Chen Jinyin*, Jin Haibo, CertiPri: Robust Prioritizing Test Inputs for Deep Neural Networks via Differential Gradient, ASE’23, 2023.7CCF-A

    [2]   Chen Jinyin, Xiong Haiyang, Zhang Dunjie, DynBackdoor: Backdoor Attack on Dynamic Link Prediction, IEEE Transaction on Network Science and Engineering2023.7

    [3]   Chen Jinyin, Ge Jie, Zheng Haibin, ActGraph: Prioritization of Test Cases Based on Deep Neural Network Activation Graph, Automated Software Engineering, 2023.7

    [4]   Chen Jinyin, Xiong Haiyang, Zheng Haibin, Zhang Dunjie, Zhang Jian, Jia Mingwei, Liu Yi*, EGC2: Enhanced Graph Classification with Easy Graph Compression, Information Sciences2023.6 CCF-B

    [5]   Chen Jinyin, Hu Shulong, Xing Changyou*, Zhang Guoming, GAIL-PT: A Generic Intelligent Penetration Testing Framework with Generative Adversarial Imitation Learning, Computers&Security. 2023CCF-B

    [6]   Chen Jinyin, Jia Chenyu, Zheng Haibin*, Xu Xiaodong, Fu Chengbo* Is Multi-Modal Necessarily Better? Robustness Evaluation of Multi-modal Fake News DetectionIEEE Transaction on Network Science and Engineering2023.2

    [7]   Zheng Haibin, Liu Tao, Li Rongchang, Chen Jinyin*, PoE: Poisoning Enhancement Through Label Smoothing in Federated Learning, IEEE Transactions on Circuits and Systems II: Express Briefs, 2023.8

    [8]   Zheng Haibin, Xiong Haiyang, Ma Haonan, Chen Jinyin*, Link-Backdoor: Backdoor Attack on Link Prediction via Node Injection, IEEE Transaction on Computational Social Systems, 2023.3 

    [9]   Jin Haibo, Chen Ruoxi, Zheng Haibin*, Chen Jinyin*, Cheng Yao, Yu Yue, Excitement Surfeited Turns to Errors: Deep Learning Testing Framework Based on Excitable Neurons, Information Sciences. 2023.4CCF-B

    [10]  Zheng Haibin, Xiong Haiyang, Chen Jinyin*, Ma Haonan, Huang Guohan, Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks from the Perspective of Motifs, IEEE Transaction on Computational System, 2023. 4

    [11]    李荣昌, 郑海斌, 赵文红,陈晋音,面向纵向图联邦学习的数据重构攻击方法,计算机科学,2023.4

    [12]    李晓豪,郑海斌,赵文红,陈晋音*,基于改进交叉熵的深度强化学习鲁棒性增强方法研究,控制与决策,2023.4

    [13]   陈晋音*,李荣昌,黄国瀚,刘涛,郑海斌:纵向联邦学习及其隐私安全综述,网络与信息安全学报,2023.4

    [14]    倪洪杰,刘嘉威,郑海斌,陈奕芃,陈晋音,NeuronSup:基于偏见神经元抑制的深度模型去偏方法,计算机科学,2023.10

    [15]    陈晋音,李潇,金海波,陈若曦,郑海斌,CheatKD:基于毒性神经元同化的知识蒸馏后门攻击方法,计算机科学,2023. 6

    [16]     葛杰,郑海斌,陈晋音,基于垂直联邦的安全深度强化学习模型,小型微型计算机系统,2023.2

    [17]    陈晋音,熊海洋,马浩男,基于对比学习的图神经网络后门攻击防御方法,通信学报,2023.4


    2022年


    [1]   Chen Jinyin, Zhang Dunjie, Ming Zhaoyan*, Bao Liang, Jiang Wenrong, Cui Chen, GraphAttacker: A General Multi-Task GraphAttack Framework,  IEEE Transaction on Network Science and Engineering, 2021

    [2]   Jin Haibo, Chen Jinyin, Zheng Haibin, Wang Zhen, Xiong Hui, Ming Zhaoyan, ROBY: Evaluating the Adversarial Robustness of a Deep Model by its Decision Boundaries, Information Sciences, 2022 (CCF-B)

    [3]   Zheng Haibin, Chen Zhiqing. Du Tianyu, Zhang Xuhong, Wang Jinyi, Cheng Yao, Ji Shouling, Chen Jinyin*, NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification, ICSE2022 (CCF-A)

    [4]   Ruoxi Chen, Jinyin Chen*, Haibin Zheng, Qi Xuan, Zhaoyan Ming, Wenrong Jiang, Chen Cui, Salient Feature Extractor for Adversarial Defense on Deep Neural Networks, Information Sciences, 2022  (CCF-B)

    [5]   Chen Jinyin*, Huang Guohan, Zheng Haibin, Yu Shanqing, Jiang Wenrong, Cui Chen, Graph-Fraudster: Adversarial Attacks on Graph Neural Network Based Vertical Federated LearningIEEE Transaction on Computational Social Systems, 2022. 3.

    [6]   Chen Jinyin, Xu Xiaodong, Chen Lihong, Ruan Zhongyuan, Ming Zhaoyan, Liu Yi, CTL-DIFF: Control Information Diffusion in Social Network by Structure Optimization, IEEE Transaction on Computational Social Systems, 2022.4

    [7]   Liu Tao, Li Mingjun, Zheng Haibin, Ming Zhaoyan, Chen Jinyin*, Evil vs Evil: Using Adversarial Examples to against Backdoor Attack in Federated Learning, Multimedia SystemsSpecial Issue on Multimedia Systems in Human-Centric Intelligent Multimedia Understanding, 2022. 6

    [8]   Chen Jinyin, Wang Xueke, Lin Xiang, GC-LSTM: Graph Convolution Embedded LSTM for Dynamic Network Link Prediction, Applied Intelligence, 2022. 5

    [9]   陈晋音,章燕,王雪柯,蔡鸿斌,王珏,纪守领,深度强化学习的攻防与安全性分析综述,自动化学报, 2022 

    [10]   王雪柯,陈晋音,陆小松,张旭鸿:基于模仿对抗策略的深度强化学习鲁棒性增强方法,小型微型计算机系统,2022

    [11]    李晓豪,郑海斌,陈晋音,谢欣怡,张龙源,鲍亮:基于神经通路的联邦学习中毒攻击方法研究,小型微型计算机系统,2022

    [12]   王鹏程,陈晋音,刘毅,基于DeepFake技术的商用活体检测平台鲁棒性评估,网络与信息安全学报,2022.01

    [13]  陈晋音,吴长安,郑海斌,一种基于Softmax激活函数变换的对抗防御方法,网络与信息安全学报,2022.3

    [14]   陈晋音,吴长安, 郑海斌, 基于通用逆扰动的对抗攻击防御方法,自动化学报,2022.4

    [15]    陈若曦,金海波,陈晋音*,郑海斌,李晓豪:深度学习模型的可靠性测试方法综述,信息安全学报,2022.6

    [16]  李荣昌,刘涛,郑海斌*,陈晋音*,陈铁明,刘振广,基于最大最小策略的纵向联邦学习隐私保护方法,自动化学报,2022.6

    [17]  Chen Jinyin, Huang Guohan, Zheng Haibin*, Lin Xiang, Graphfool: Targeted Label Adversarial Attack on Graph Embedding, IEEE Transactions on Computational Social Systems2022.6

    [18] Jie Ge, Xinyi Xie, Haibin Zheng*, Jinyin Chen, Hu Li, Ling Pang, Wenhong Zhao, Changting Lin*, A Secured Deep Reinforcement Learning Model Based on Vertical Federated Learning, BDSC2022

    [19]  Chen Jinyin*Wang XuekeZhang YanYu Shanqing*Bao Liang, Agent Manipulator: Stealthy Strategy Attacks on Deep Reinforcement Learning, Applied Intelligence2022.6

    [20]  Chen Jinyin, Jia Chengyu, Zheng Haibin, Lin Changtin, Research on Fake News Detection based on Diffusion Growth Rate, Wireless Communications and Mobile Computing, 2022.4

    [21]    陈晋音,邹健飞,王巍,一种利用反差值操作的隐蔽中毒攻击方法,控制与决策,2022.7

    [22]   俞天乐,郑海斌,吴长安,赵文红,李虎,庞玲,陈晋音*,基于样本语义与模型激活特征的对抗检测方法,DSIT 2022

    [23]    Lu Yao, Chen Jinyin, Xuan Qi, Understanding the Dynamics of DNNs Using Graph Modularity, ECCV2022(CCF-B)

    [24]   陈晋音,胡书隆,邢长友,张国敏,面向智能渗透攻击的欺骗防御方法,通信学报,2022.10

    [25]  Zheng Haibin, Li Xiaohao, Chen Jinyin, Zhang Yan, Lin Changting*, One4All: Manipulate One Agent to Poison the Cooperative Multi-Agent Reinforcement Learning, Computers&Security2022(CCF-B)


    2021年

    [1]   Zheng Haibin, Chen Jinyin, Zhu Weipeng, Ji Shouling, Zhang Xuhong*, GRIP-GAN: An Attack-Free Defense through General Robust Inverse PerturbationTDSC2021, (CCF-A)

    [2]   Zhen Shilian, Ye Linhui, Chen Jinyin, Yang Xiaoniu, Primary User Adversarial Attacks on Deep Learning-based Spectrum Sensing and the Defense Method, China Communication, 2021

    [3]   Chen Jinyin, Zhang Jian, Xuanqi*, Time-aware Gradient Attack on Dynamic Network Link PredictionTKDE2021(CCF-A)

    [4]   陈晋音,黄国瀚,一种面向图神经网络的图重构防御方法,计算机研究与发展,2021

    [5]   陈晋音,张敦杰,图分类攻防综述,网络与信息安全学报,2021

    [6]   陈晋音,陈奕芃,陈一鸣,郑海斌,纪守领,面向深度学习的公平性研究综述,计算机研究与发展,2021

    [7]   Chen Jinyin, Zhang Longyuan, Zheng Haibin, Ming Zhaoyan*,DeepPoison: Feature Transfer Based Stealthy Poisoning Attack , IEEE Transactions on Circuits and Systems II: Express Briefs. 2021 

    [8]   Chen Jinyin*, Zhen Haibing, Shangguan Wenchang, Ji Shouling, ACT-Detector: Adaptive Channel Transformation-based Light-Weighted Detector for Adversarial AttacksInformation Sciences. 2021(CCF-B)

    [9]   Huang Liang, Chen Jinyin*, Visualizing Deep Learning-based Radio Modulation Classifie, IEEE Transactions on Cognitive Communications and Networking. 2021

    [10]  Chen Jinyin, Cui Hui, FEM: Feature Extraction and Mapping for Radio Modulation Classification, Physical Communication2021

    [11] Chen Jinyin*, Wang Xueke, Su Mengmeng, Lin Xiang. A Fast Detector Generation Algorithm for Negative Selection. Applied Intelligence,2021.10

    [12]  Chen Jinyin*, Zheng Haibin, Xiong Hui, FineFool: A Novel DNN Object Contour Attack on Image Recognition Based on the Attention Perturbation Adversarial Technique, Computers and Security2021.2 (CCF-B)

    [13]  Chen Jinyin, Xiong HuiMing ZhaoyanLiu Yi*Anti-Interpolation: An Attack Facilitator Hiding Adversaries into Images, IEEE Transactions on Circuits and Systems II: Express Briefs. 2021

    [14]   Chen Jinyin*, Wu Changan, Shangguan Wenchang, Zhang Xuhong, Chen  Jianhai, DAS-AST: Defending Against Model Stealing Attacks Based on Adaptive Softmax Transformation, Inscrypt 2021.

    [15]  Xu Huilin, Chen Jinyin, Zhang Jian, Xuan Qi, Time-Series Snapshot Network as A New Model for Role Recommendation in OSS, TCSS,2021

    [16] Chen Jinyin*, Ye Linhui, Ming Zhaoyan, MASS: Multi-task Anthropomorphic Speech Synthesis Framework, Computer Speech & Language, 2021

    [17]  郑海斌,陈晋音*,章燕,张旭鸿,葛春鹏,刘哲,欧阳亦可,纪守领,面向自然语言处理的对抗攻防与鲁棒性分析综述,计算机研究与发展,2021

    [18] 徐国宁,陈奕芃,陈一鸣,陈晋音*,温浩,基于约束优化生成式对抗网络的数据去偏方法,计算机科学

    [19]  Guodong Jiang, Jingjing Zhang, Jinyin Chen, Haibin Zheng, Liang Bao*. Unsupervised Face Recognition Algorithm based on Fast Density Clustering Algorithm, AMLSP 2021.

    [20] 陈晋音,上官文昌,张京京,郑海斌,郑雅羽,张旭鸿:面向迁移模型的成员推理攻击,通信学报,2021


链接

更新时间:2026.03.18
总访问量:10