2026
[1] Chen Jinyin, Han Ye, Zheng Haibin, Yang Xing*, UniCamo: A Universal Physical Camouflage for Multispectual Object Detection,ICASSP,2026年5月4日
[2] Chen Jinyin, Zhang Tianxin, Zhao Xiaoming, Zheng Haibin, Ji Baiyang, LightPro: a light-weighted multi-channel protection for edge-oriented deep learning models, Applied soft computing, 2026年1月10日
[3] 陈晋音,穆文博,郑海斌,基于模体增强对比学习的图神经网络后门防御方法,自动化学报,2026年1月4日
[4] Chen Jinyin, Bai Yang, Ma Minying, Chen Defu, Zheng Yayu, Chen Tieming, Ji Baiyang, Causal Inference-based Collaborative Membership Inference Attack on Federated Recommendation,IEEE Transaction on Computational Social Systems, 2026年1月12日
[5] Zhang Ximin, Chen Jinyin, Zheng Haibin, One Subspace to Fool Them All: A Unified Black-box Attack on Perception Models in Embodied Intelligence, Applied Soft Computing, 2025年11月1日(中科院二区)2026年2月14日
[6] Haibin Zheng, Xiaojuan Wang, Jinyin Chen*, Hui Xiong,Zhaoyan Ming, MFR: Multi-channel Feature Redistribution for Adversary Detection in Sub-category Classification, IET Information Security,2026年2月9日
[7] 陈晋音,王泽楷,沈文杰,张甜馨,郑海斌,邱洪君,多模态大模型的偏见及其公平性提升综述,网络与系统安全学报,2026年2月28日
2025年
[1] Zhang Ximing, Chen Jinyin*, Zheng Haibin, Liu Zhengguang, PhyCamo: A Robust Physical Camouflage via Contrastive Learning for Multi-View Physical Adversarial Attack, AAAI 25, 2025年2月10日
[2] Jia Chengyu, Chen Jinyin*, Li Xiaohao, Zheng Haibin*, BallPri: Test Cases Prioritization for Deep Neuron Networks via Tolerant Ball in Variable Space, Automated Software Engineering, 2025年2月1日
[3] Chen Jinyin, Liao Danxin, Yan Yunjie, Xiang Sheng, Zheng Haibin, LiDAttack: Robust Black-Box Attack on LiDAR-Based Object Detection, IEEE Transactions on Intelligent Transportation Systems, 2025年4月
[4] Chen Jinyin, Cao Zhiqi, Zhang Tianxin, Zheng Haibin, Zheng Yayu*, FairQuanti: Fair Quantification of Deep Neural Networks via Neuron Role Contributions,ACM Transactions on Privacy and Security, 2025年5月5日
[5] Pan Xiaohua, Ye Linhui, Weng Deyu, Chen Jinyin, Yin Jianwei, RTNILM: A Deep Robust Transfer Neural Network for Practical Application of NILM, IEEE Transaction on Industrial Informatics, 2025. 6
[6] Chen Jinyin, Mu Wenbo, Ma Haonan, Wang Chenyi, Zheng Haibin*, Can Contrastive Learning Always be Trusted? Privacy Leakage Evaluation of Contrastive Learning for Graph Neural Networks,IEEE Transactions on Computational Social Systems, 2025年8月20日
[7] Chen Jinyin, Ao Fanyu, Ma Haonan, DefGCL: Defence-enhanced graph contrastive learning against attribute inference attacks, Applied Soft Computing, 2025年9月14日
[8] 贾澄钰,陈晋音*,金海波,陈若曦,郑海斌,大语言模型的安全威胁与防御综述,信息安全学报,2024年6月27日
[9] 陈若曦,陈晋音,阳雪燕,郑海斌,纪守领,陈铁明,面向深度学习模型供应链的安全性研究综述,计算机研究与发展,2024年5月, 8月13日
[10] 项圣,廖丹芯,陈晋音*,郑海斌,基于激光雷达点云的目标检测安全性综述,网络与信息安全学报,2025年2月1日
[11] 陈晋音,瞿康赟,郑海斌,基于模仿学习的深度强化学习目标轨迹隐私推断攻击,网络与信息安全学报,2025年9月16日
[12] 王小娟,陈晋音,郑海斌,陈靖文,基于对比学习自蒸馏的深度模型水印剔除黑盒攻击,信息安全学报,2025年9月15日
[13] 曹志骐,陈晋音,郑海斌,基于神经元动态约束的隐蔽量化偏见注入方法网络空间安全科学学报,2025年11月30日
2024年
[1] Chen Jinyin, Zheng Haibin, Liu Tao, Liu Jiawei, Cheng Yao, Zhang Xuhong, and Ji Shouling, EdgePro: Edge Deep Learning Model Protection via Neuron Authorization, TDSC 2024年2月11日
[2] Chen Jinyin, Jia Chengyu, Yan Yunjie, Ge Jie, Zheng Haibin, Cheng Yao, A Miss Is as Good as A Mile: Metamorphic Testing Based Precision Analysis for Deep Learning Operators, FSE 2024年4月16日
[3] Chen Jinyin, Ge Jie, Zheng Shilian, Ye Linhui, Zhang Longyuan, Shen Weiguo, Yue Keqiang, Yang Xiaoniu, AIR: Threats of Adversarial Attacks on Deep Learning-Based Information Recovery, IEEE Transaction on Wireless Communication, 2024年3月4日
[4] Chen Jinyin, Liao Danxin, Zheng Shilian, Ye Linhui, Jia Chengyu, Zheng Haibin, Xiang Sheng, RobustRMC: Robustness Interpretable Deep Neural Network for Radio Modulation Classification, IEEE Transaction on Cognitive Communication Network, 2024年3月
[5] Chen Jinyin, Li Mingjun, Liu Tao, Zheng Haibin, Du Hang*, Rethinking the Defense Against Free-rider Attack from the Perspective of Model Weight Evolving Frequency, Information Sciences. 2024年3月25日。
[6] Chen Jinyin, Zhao Xiaoming, Li Xiao, Zheng Haibin, Xiang Sheng, Guo Haifeng, Robust Knowledge Distillation Based on Feature Variance for Backdoored Teacher Model, Applied Soft Computing, 2024年6月20日
[7] Chen Ruoxi, Jin Haibo, Chen Jinyin*, Zheng Haibin, Fight Perturbations with Perturbations: Defending Adversarial Attacks via Neuron Influence, TDSC,2024年8月
[8] Jia Chenyu, Chen Jinyin, Ji Shouling, Cheng Yao, Zheng Haibin, Xuan Qi, Backdoor Online Tracing with Evolving Graphs, TIFS,2024年10月5日
[9] 陈晋音,赵晓明,郑海斌,郭海锋,基于光学的物理域对抗攻击综述,网络与信息安全学报,2024年2月5日
[10] Jin Haibo, Chen Jinyin, Ming Zhaoyan, Zheng Haibin, Yu Yue, CatchBackdoor: Backdoor Detection via Critical Trojan Neural Path Fuzzing,ECCV 2024, 2024年7月
[11] Chen Ruoxi, Chen Jinyin, Jin Haibo, EditShield: Protecting Unauthorized Image Editing by Instruction-guided Diffusion Models, ECCV 2024, 2024年7月
[12] Chen Jinyin*, Cao Zhiqi, Chen Ruoxi, Li Xiao, Zheng Haibin, Xuan Qi. Like Teacher, Like Pupil: Transferring Backdoors via Feature-based Knowledge Distillation, Computers&Security, 2024.8
[13] Zheng Haibin, Chen Jinyin, Liu Tao, Zhang Xuhong, Chen Yao, Ji Shouling, DP-Poison: Poisoning Federated Learning under Cover of Differential Privacy, ACM Transactions on Transactions on Privacy and Security,2024年10月24日
2023年
[1] Zheng Haibin, Chen Jinyin*, Jin Haibo, CertiPri: Robust Prioritizing Test Inputs for Deep Neural Networks via Differential Gradient, ASE’23, 2023.7(CCF-A)
[2] Chen Jinyin, Xiong Haiyang, Zhang Dunjie, DynBackdoor: Backdoor Attack on Dynamic Link Prediction, IEEE Transaction on Network Science and Engineering,2023.7
[3] Chen Jinyin, Ge Jie, Zheng Haibin, ActGraph: Prioritization of Test Cases Based on Deep Neural Network Activation Graph, Automated Software Engineering, 2023.7
[4] Chen Jinyin, Xiong Haiyang, Zheng Haibin, Zhang Dunjie, Zhang Jian, Jia Mingwei, Liu Yi*, EGC2: Enhanced Graph Classification with Easy Graph Compression, Information Sciences,2023.6 (CCF-B)
[5] Chen Jinyin, Hu Shulong, Xing Changyou*, Zhang Guoming, GAIL-PT: A Generic Intelligent Penetration Testing Framework with Generative Adversarial Imitation Learning, Computers&Security. 2023(CCF-B)
[6] Chen Jinyin, Jia Chenyu, Zheng Haibin*, Xu Xiaodong, Fu Chengbo* Is Multi-Modal Necessarily Better? Robustness Evaluation of Multi-modal Fake News Detection,IEEE Transaction on Network Science and Engineering,2023.2
[7] Zheng Haibin, Liu Tao, Li Rongchang, Chen Jinyin*, PoE: Poisoning Enhancement Through Label Smoothing in Federated Learning, IEEE Transactions on Circuits and Systems II: Express Briefs, 2023.8
[8] Zheng Haibin, Xiong Haiyang, Ma Haonan, Chen Jinyin*, Link-Backdoor: Backdoor Attack on Link Prediction via Node Injection, IEEE Transaction on Computational Social Systems, 2023.3
[9] Jin Haibo, Chen Ruoxi, Zheng Haibin*, Chen Jinyin*, Cheng Yao, Yu Yue, Excitement Surfeited Turns to Errors: Deep Learning Testing Framework Based on Excitable Neurons, Information Sciences. 2023.4(CCF-B)
[10] Zheng Haibin, Xiong Haiyang, Chen Jinyin*, Ma Haonan, Huang Guohan, Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks from the Perspective of Motifs, IEEE Transaction on Computational System, 2023. 4
[11] 李荣昌, 郑海斌, 赵文红,陈晋音,面向纵向图联邦学习的数据重构攻击方法,计算机科学,2023.4
[12] 李晓豪,郑海斌,赵文红,陈晋音*,基于改进交叉熵的深度强化学习鲁棒性增强方法研究,控制与决策,2023.4
[13] 陈晋音*,李荣昌,黄国瀚,刘涛,郑海斌:纵向联邦学习及其隐私安全综述,网络与信息安全学报,2023.4
[14] 倪洪杰,刘嘉威,郑海斌,陈奕芃,陈晋音,NeuronSup:基于偏见神经元抑制的深度模型去偏方法,计算机科学,2023.10
[15] 陈晋音,李潇,金海波,陈若曦,郑海斌,CheatKD:基于毒性神经元同化的知识蒸馏后门攻击方法,计算机科学,2023. 6
[16] 葛杰,郑海斌,陈晋音,基于垂直联邦的安全深度强化学习模型,小型微型计算机系统,2023.2
[17] 陈晋音,熊海洋,马浩男,基于对比学习的图神经网络后门攻击防御方法,通信学报,2023.4
2022年
[1] Chen Jinyin, Zhang Dunjie, Ming Zhaoyan*, Bao Liang, Jiang Wenrong, Cui Chen, GraphAttacker: A General Multi-Task GraphAttack Framework, IEEE Transaction on Network Science and Engineering, 2021
[2] Jin Haibo, Chen Jinyin, Zheng Haibin, Wang Zhen, Xiong Hui, Ming Zhaoyan, ROBY: Evaluating the Adversarial Robustness of a Deep Model by its Decision Boundaries, Information Sciences, 2022 (CCF-B)
[3] Zheng Haibin, Chen Zhiqing. Du Tianyu, Zhang Xuhong, Wang Jinyi, Cheng Yao, Ji Shouling, Chen Jinyin*, NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification, ICSE2022 (CCF-A)
[4] Ruoxi Chen, Jinyin Chen*, Haibin Zheng, Qi Xuan, Zhaoyan Ming, Wenrong Jiang, Chen Cui, Salient Feature Extractor for Adversarial Defense on Deep Neural Networks, Information Sciences, 2022 (CCF-B)
[5] Chen Jinyin*, Huang Guohan, Zheng Haibin, Yu Shanqing, Jiang Wenrong, Cui Chen, Graph-Fraudster: Adversarial Attacks on Graph Neural Network Based Vertical Federated Learning,IEEE Transaction on Computational Social Systems, 2022. 3.
[6] Chen Jinyin, Xu Xiaodong, Chen Lihong, Ruan Zhongyuan, Ming Zhaoyan, Liu Yi, CTL-DIFF: Control Information Diffusion in Social Network by Structure Optimization, IEEE Transaction on Computational Social Systems, 2022.4
[7] Liu Tao, Li Mingjun, Zheng Haibin, Ming Zhaoyan, Chen Jinyin*, Evil vs Evil: Using Adversarial Examples to against Backdoor Attack in Federated Learning, Multimedia Systems:Special Issue on Multimedia Systems in Human-Centric Intelligent Multimedia Understanding, 2022. 6
[8] Chen Jinyin, Wang Xueke, Lin Xiang, GC-LSTM: Graph Convolution Embedded LSTM for Dynamic Network Link Prediction, Applied Intelligence, 2022. 5
[9] 陈晋音,章燕,王雪柯,蔡鸿斌,王珏,纪守领,深度强化学习的攻防与安全性分析综述,自动化学报, 2022
[10] 王雪柯,陈晋音,陆小松,张旭鸿:基于模仿对抗策略的深度强化学习鲁棒性增强方法,小型微型计算机系统,2022
[11] 李晓豪,郑海斌,陈晋音,谢欣怡,张龙源,鲍亮:基于神经通路的联邦学习中毒攻击方法研究,小型微型计算机系统,2022
[12] 王鹏程,陈晋音,刘毅,基于DeepFake技术的商用活体检测平台鲁棒性评估,网络与信息安全学报,2022.01
[13] 陈晋音,吴长安,郑海斌,一种基于Softmax激活函数变换的对抗防御方法,网络与信息安全学报,2022.3
[14] 陈晋音,吴长安, 郑海斌, 基于通用逆扰动的对抗攻击防御方法,自动化学报,2022.4
[15] 陈若曦,金海波,陈晋音*,郑海斌,李晓豪:深度学习模型的可靠性测试方法综述,信息安全学报,2022.6
[16] 李荣昌,刘涛,郑海斌*,陈晋音*,陈铁明,刘振广,基于最大最小策略的纵向联邦学习隐私保护方法,自动化学报,2022.6
[17] Chen Jinyin, Huang Guohan, Zheng Haibin*, Lin Xiang, Graphfool: Targeted Label Adversarial Attack on Graph Embedding, IEEE Transactions on Computational Social Systems,2022.6
[18] Jie Ge, Xinyi Xie, Haibin Zheng*, Jinyin Chen, Hu Li, Ling Pang, Wenhong Zhao, Changting Lin*, A Secured Deep Reinforcement Learning Model Based on Vertical Federated Learning, BDSC2022
[19] Chen Jinyin*,Wang Xueke,Zhang Yan,Yu Shanqing*,Bao Liang, Agent Manipulator: Stealthy Strategy Attacks on Deep Reinforcement Learning, Applied Intelligence,2022.6
[20] Chen Jinyin, Jia Chengyu, Zheng Haibin, Lin Changtin, Research on Fake News Detection based on Diffusion Growth Rate, Wireless Communications and Mobile Computing, 2022.4
[21] 陈晋音,邹健飞,王巍,一种利用反差值操作的隐蔽中毒攻击方法,控制与决策,2022.7
[22] 俞天乐,郑海斌,吴长安,赵文红,李虎,庞玲,陈晋音*,基于样本语义与模型激活特征的对抗检测方法,DSIT 2022
[23] Lu Yao, Chen Jinyin, Xuan Qi, Understanding the Dynamics of DNNs Using Graph Modularity, ECCV2022(CCF-B)
[24] 陈晋音,胡书隆,邢长友,张国敏,面向智能渗透攻击的欺骗防御方法,通信学报,2022.10
[25] Zheng Haibin, Li Xiaohao, Chen Jinyin, Zhang Yan, Lin Changting*, One4All: Manipulate One Agent to Poison the Cooperative Multi-Agent Reinforcement Learning, Computers&Security,2022(CCF-B)
2021年
[1] Zheng Haibin, Chen Jinyin, Zhu Weipeng, Ji Shouling, Zhang Xuhong*, GRIP-GAN: An Attack-Free Defense through General Robust Inverse Perturbation:TDSC,2021, (CCF-A)
[2] Zhen Shilian, Ye Linhui, Chen Jinyin, Yang Xiaoniu, Primary User Adversarial Attacks on Deep Learning-based Spectrum Sensing and the Defense Method, China Communication, 2021
[3] Chen Jinyin, Zhang Jian, Xuanqi*, Time-aware Gradient Attack on Dynamic Network Link Prediction,TKDE,2021(CCF-A)
[4] 陈晋音,黄国瀚,一种面向图神经网络的图重构防御方法,计算机研究与发展,2021
[5] 陈晋音,张敦杰,图分类攻防综述,网络与信息安全学报,2021
[6] 陈晋音,陈奕芃,陈一鸣,郑海斌,纪守领,面向深度学习的公平性研究综述,计算机研究与发展,2021
[7] Chen Jinyin, Zhang Longyuan, Zheng Haibin, Ming Zhaoyan*,DeepPoison: Feature Transfer Based Stealthy Poisoning Attack , IEEE Transactions on Circuits and Systems II: Express Briefs. 2021
[8] Chen Jinyin*, Zhen Haibing, Shangguan Wenchang, Ji Shouling, ACT-Detector: Adaptive Channel Transformation-based Light-Weighted Detector for Adversarial Attacks,Information Sciences. 2021(CCF-B)
[9] Huang Liang, Chen Jinyin*, Visualizing Deep Learning-based Radio Modulation Classifie, IEEE Transactions on Cognitive Communications and Networking. 2021
[10] Chen Jinyin, Cui Hui, FEM: Feature Extraction and Mapping for Radio Modulation Classification, Physical Communication,2021
[11] Chen Jinyin*, Wang Xueke, Su Mengmeng, Lin Xiang. A Fast Detector Generation Algorithm for Negative Selection. Applied Intelligence,2021.10
[12] Chen Jinyin*, Zheng Haibin, Xiong Hui, FineFool: A Novel DNN Object Contour Attack on Image Recognition Based on the Attention Perturbation Adversarial Technique, Computers and Security,2021.2 (CCF-B)
[13] Chen Jinyin, Xiong Hui,Ming Zhaoyan,Liu Yi*,Anti-Interpolation: An Attack Facilitator Hiding Adversaries into Images, IEEE Transactions on Circuits and Systems II: Express Briefs. 2021
[14] Chen Jinyin*, Wu Changan, Shangguan Wenchang, Zhang Xuhong, Chen Jianhai, DAS-AST: Defending Against Model Stealing Attacks Based on Adaptive Softmax Transformation, Inscrypt 2021.
[15] Xu Huilin, Chen Jinyin, Zhang Jian, Xuan Qi, Time-Series Snapshot Network as A New Model for Role Recommendation in OSS, TCSS,2021
[16] Chen Jinyin*, Ye Linhui, Ming Zhaoyan, MASS: Multi-task Anthropomorphic Speech Synthesis Framework, Computer Speech & Language, 2021
[17] 郑海斌,陈晋音*,章燕,张旭鸿,葛春鹏,刘哲,欧阳亦可,纪守领,面向自然语言处理的对抗攻防与鲁棒性分析综述,计算机研究与发展,2021
[18] 徐国宁,陈奕芃,陈一鸣,陈晋音*,温浩,基于约束优化生成式对抗网络的数据去偏方法,计算机科学
[19] Guodong Jiang, Jingjing Zhang, Jinyin Chen, Haibin Zheng, Liang Bao*. Unsupervised Face Recognition Algorithm based on Fast Density Clustering Algorithm, AMLSP 2021.
[20] 陈晋音,上官文昌,张京京,郑海斌,郑雅羽,张旭鸿:面向迁移模型的成员推理攻击,通信学报,2021