default search action
Jianhai Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Lingling Lu, Zhenyu Wen, Ye Yuan, Qinming He, Jianhai Chen, Zhenguang Liu:
ANNProof: Building a verifiable and efficient outsourced approximate nearest neighbor search system on blockchain. Future Gener. Comput. Syst. 156: 206-220 (2024) - [c25]Dazhong Rong, Guoyao Yu, Shuheng Shen, Xinyi Fu, Peng Qian, Jianhai Chen, Qinming He, Xing Fu, Weiqiang Wang:
Clean-Image Backdoor Attacks. ICANN (10) 2024: 187-202 - [c24]Peng Qian, Hanjie Wu, Zeren Du, Turan Vural, Dazhong Rong, Zheng Cao, Lun Zhang, Yanbin Wang, Jianhai Chen, Qinming He:
MuFuzz: Sequence-Aware Mutation and Seed Mask Guidance for Blockchain Smart Contract Fuzzing. ICDE 2024: 1972-1985 - [c23]Jiashui Wang, Peng Qian, Xilin Huang, Xinlei Ying, Yan Chen, Shouling Ji, Jianhai Chen, Jundong Xie, Long Liu:
Tacoma: Enhanced Browser Fuzzing with Fine-Grained Semantic Alignment. ISSTA 2024: 1174-1185 - [c22]Dinghao Liu, Zhipeng Lu, Shouling Ji, Kangjie Lu, Jianhai Chen, Zhenguang Liu, Dexin Liu, Renyi Cai, Qinming He:
Detecting Kernel Memory Bugs through Inconsistent Memory Management Intention Inferences. USENIX Security Symposium 2024 - [i14]Dazhong Rong, Guoyao Yu, Shuheng Shen, Xinyi Fu, Peng Qian, Jianhai Chen, Qinming He, Xing Fu, Weiqiang Wang:
Clean-image Backdoor Attacks. CoRR abs/2403.15010 (2024) - [i13]Jianhai Chen, Yanlin Wu, Dazhong Rong, Guoyao Yu, Lingqi Jiang, Zhenguang Liu, Peng Zhou, Rui Shen:
Blockchain-based Federated Recommendation with Incentive Mechanism. CoRR abs/2409.01563 (2024) - 2023
- [j15]Jianhai Chen, Huapu Zeng, Yunming Pu:
Voice Calibration Using Ambient Sensors. J. Circuits Syst. Comput. 32(3): 2350043:1-2350043:19 (2023) - [j14]Lingling Lu, Zhenyu Wen, Ye Yuan, Binru Dai, Peng Qian, Changting Lin, Qinming He, Zhenguang Liu, Jianhai Chen, Rajiv Ranjan:
iQuery: A Trustworthy and Scalable Blockchain Analytics Platform. IEEE Trans. Dependable Secur. Comput. 20(6): 4578-4592 (2023) - [c21]Erteng Liu, Tianchi Lu, Rui Shen, Jianhai Chen, Butian Huang:
Efficient Balancing A* Search for Multi-robot Collaboration With Blockchain Consensus. BSCI 2023: 114-122 - [c20]Zhengjie Huang, Yunyang Huang, Peng Qian, Jianhai Chen, Qinming He:
Demystifying Bitcoin Address Behavior via Graph Neural Networks. ICDE 2023: 1747-1760 - [c19]Haonan Hu, Dazhong Rong, Jianhai Chen, Qinming He, Zhenguang Liu:
CoMeta: Enhancing Meta Embeddings with Collaborative Information in Cold-Start Problem of Recommendation. KSEM (3) 2023: 213-225 - [i12]Haonan Hu, Dazhong Rong, Jianhai Chen, Qinming He, Zhenguang Liu:
CoMeta: Enhancing Meta Embeddings with Collaborative Information in Cold-start Problem of Recommendation. CoRR abs/2303.07607 (2023) - [i11]Peng Qian, Rui Cao, Zhenguang Liu, Wenqing Li, Ming Li, Lun Zhang, Yufeng Xu, Jianhai Chen, Qinming He:
Empirical Review of Smart Contract and DeFi Security: Vulnerability Detection and Automated Repair. CoRR abs/2309.02391 (2023) - [i10]Peng Qian, Hanjie Wu, Zeren Du, Turan Vural, Dazhong Rong, Zheng Cao, Lun Zhang, Yanbin Wang, Jianhai Chen, Qinming He:
MuFuzz: Sequence-Aware Mutation and Seed Mask Guidance for Blockchain Smart Contract Fuzzing. CoRR abs/2312.04512 (2023) - 2022
- [j13]Zhengjie Huang, Zhenguang Liu, Jianhai Chen, Qinming He, Shuang Wu, Lei Zhu, Meng Wang:
Who is gambling? Finding cryptocurrency gamblers using multi-modal retrieval methods. Int. J. Multim. Inf. Retr. 11(4): 539-551 (2022) - [j12]Yuwei Li, Shouling Ji, Chenyang Lyu, Yuan Chen, Jianhai Chen, Qinchen Gu, Chunming Wu, Raheem Beyah:
V-Fuzz: Vulnerability Prediction-Assisted Evolutionary Fuzzing for Binary Programs. IEEE Trans. Cybern. 52(5): 3745-3756 (2022) - [j11]Chenghui Shi, Xiaogang Xu, Shouling Ji, Kai Bu, Jianhai Chen, Raheem Beyah, Ting Wang:
Adversarial CAPTCHAs. IEEE Trans. Cybern. 52(7): 6095-6108 (2022) - [c18]Dazhong Rong, Shuai Ye, Ruoyan Zhao, Hon Ning Yuen, Jianhai Chen, Qinming He:
FedRecAttack: Model Poisoning Attack to Federated Recommendation. ICDE 2022: 2643-2655 - [c17]Dazhong Rong, Qinming He, Jianhai Chen:
Poisoning Deep Learning Based Recommender Model in Federated Learning Scenarios. IJCAI 2022: 2204-2210 - [i9]Dazhong Rong, Shuai Ye, Ruoyan Zhao, Hon Ning Yuen, Jianhai Chen, Qinming He:
FedRecAttack: Model Poisoning Attack to Federated Recommendation. CoRR abs/2204.01499 (2022) - [i8]Dazhong Rong, Qinming He, Jianhai Chen:
Poisoning Deep Learning based Recommender Model in Federated Learning Scenarios. CoRR abs/2204.13594 (2022) - [i7]Zhengjie Huang, Yunyang Huang, Peng Qian, Jianhai Chen, Qinming He:
Demystifying Bitcoin Address Behavior via Graph Neural Networks. CoRR abs/2211.14582 (2022) - [i6]Zhengjie Huang, Zhenguang Liu, Jianhai Chen, Qinming He, Shuang Wu, Lei Zhu, Meng Wang:
Who is Gambling? Finding Cryptocurrency Gamblers Using Multi-modal Retrieval Methods. CoRR abs/2211.14779 (2022) - 2021
- [j10]Haiqin Weng, Shouling Ji, Changchang Liu, Ting Wang, Qinming He, Jianhai Chen:
Fast-RCM: Fast Tree-Based Unsupervised Rare-Class Mining. IEEE Trans. Cybern. 51(10): 5198-5211 (2021) - [j9]Jianhai Chen, Deshi Ye, Zhenguang Liu, Shouling Ji, Qinming He, Yang Xiang:
A Truthful and Near-Optimal Mechanism for Colocation Emergency Demand Response. IEEE Trans. Mob. Comput. 20(9): 2728-2744 (2021) - [c16]Dinghao Liu, Qiushi Wu, Shouling Ji, Kangjie Lu, Zhenguang Liu, Jianhai Chen, Qinming He:
Detecting Missed Security Operations Through Differential Checking of Object-based Similar Paths. CCS 2021: 1627-1644 - 2020
- [j8]Changting Lin, Ning Ma, Xun Wang, Jianhai Chen:
Rapido: Scaling blockchain with multi-path payment channels. Neurocomputing 406: 322-332 (2020) - [c15]Zhenguang Liu, Sihao Hu, Yifang Yin, Jianhai Chen, Kevin Chiew, Luming Zhang, Zetian Wu:
Interactive Rare-Category-of-Interest Mining from Large Datasets. AAAI 2020: 4965-4972
2010 – 2019
- 2019
- [j7]Haiqin Weng, Binbin Zhao, Shouling Ji, Jianhai Chen, Ting Wang, Qinming He, Raheem Beyah:
Towards understanding the security of modern image captchas and underground captcha-solving services. Big Data Min. Anal. 2(2): 118-144 (2019) - [j6]Shouling Ji, Ting Wang, Jianhai Chen, Weiqing Li, Prateek Mittal, Raheem Beyah:
De-SAG: On the De-Anonymization of Structure-Attribute Graph Data. IEEE Trans. Dependable Secur. Comput. 16(4): 594-607 (2019) - [c14]Lingling Lu, Jianhai Chen, Zijun Tian, Qinming He, Butian Huang, Yang Xiang, Zhenguang Liu:
EduCoin: a Secure and Efficient Payment Solution for MOOC Environment. Blockchain 2019: 490-495 - [c13]Peng Qian, Zhenguang Liu, Xun Wang, Jianhai Chen, Bei Wang, Roger Zimmermann:
Digital Resource Rights Confirmation and Infringement Tracking Based on Smart Contracts. CCIS 2019: 62-67 - [c12]Haiqin Weng, Shouling Ji, Fuzheng Duan, Zhao Li, Jianhai Chen, Qinming He, Ting Wang:
CATS: Cross-Platform E-Commerce Fraud Detection. ICDE 2019: 1874-1885 - [c11]Jianhai Chen, Deshi Ye, Shouling Ji, Qinming He, Yang Xiang, Zhenguang Liu:
A Truthful FPTAS Mechanism for Emergency Demand Response in Colocation Data Centers. INFOCOM 2019: 2557-2565 - [i5]Chenghui Shi, Xiaogang Xu, Shouling Ji, Kai Bu, Jianhai Chen, Raheem A. Beyah, Ting Wang:
Adversarial CAPTCHAs. CoRR abs/1901.01107 (2019) - [i4]Yuwei Li, Shouling Ji, Chenyang Lv, Yuan Chen, Jianhai Chen, Qinchen Gu, Chunming Wu:
V-Fuzz: Vulnerability-Oriented Evolutionary Fuzzing. CoRR abs/1901.01142 (2019) - [i3]Jianhai Chen, Deshi Ye, Shouling Ji, Qinming He, Yang Xiang, Zhenguang Liu:
A Truthful FPTAS Mechanism for Emergency Demand Response in Colocation Data Centers. CoRR abs/1901.02978 (2019) - 2018
- [c10]Binbin Zhao, Haiqin Weng, Shouling Ji, Jianhai Chen, Ting Wang, Qinming He, Reheem Beyah:
Towards Evaluating the Security of Real-World Deployed Image CAPTCHAs. AISec@CCS 2018: 85-96 - [i2]Chenyang Lv, Shouling Ji, Yuwei Li, Junfeng Zhou, Jianhai Chen, Pan Zhou, Jing Chen:
SmartSeed: Smart Seed Generation for Efficient Fuzzing. CoRR abs/1807.02606 (2018) - [i1]Chang-Ting Lin, Ning Ma, Xun Wang, Zhenguang Liu, Jianhai Chen, Shouling Ji:
Rapido: A Layer2 Payment System for Decentralized Currencies. CoRR abs/1808.01561 (2018) - 2017
- [j5]Shuang Wu, Qinming He, Jianhai Chen, Bei Wang, Butian Huang:
HHMO: A Hot-page Based Hybrid-copy Migration Optimization Method. Ad Hoc Sens. Wirel. Networks 38(1-4): 263-291 (2017) - [j4]Jianhai Chen, Qinming He, Deshi Ye, Wenzhi Chen, Yang Xiang, Kevin Chiew, Liangwei Zhu:
Joint affinity aware grouping and virtual machine placement. Microprocess. Microsystems 52: 365-380 (2017) - [j3]Butian Huang, Zhenguang Liu, Jianhai Chen, Anan Liu, Qi Liu, Qinming He:
Behavior pattern clustering in blockchain networks. Multim. Tools Appl. 76(19): 20099-20110 (2017) - 2016
- [c9]Shuang Wu, Bei Wang, Ce Yang, Qinming He, Jianhai Chen:
A Hot-Page Aware Hybrid-Copy Migration Method. IC2E 2016: 220-221 - 2014
- [c8]Shuang Wu, Ce Yang, Jianhai Chen, Qinming He, Bei Wang:
DP: Dynamic Prepage in Postcopy Migration for Fixed-Size Data Load. NPC 2014: 530-533 - 2013
- [j2]Deshi Ye, Jianhai Chen:
Non-cooperative games on multidimensional resource allocation. Future Gener. Comput. Syst. 29(6): 1345-1352 (2013) - [c7]Jianhai Chen, Kevin Chiew, Deshi Ye, Liangwei Zhu, Wenzhi Chen:
AAGA: Affinity-Aware Grouping for Allocation of Virtual Machines. AINA 2013: 235-242 - 2011
- [j1]Dawei Huang, Deshi Ye, Qinming He, Jianhai Chen, Kejiang Ye:
Virt-LM: a benchmark for live migration of virtual machine (abstracts only). SIGMETRICS Perform. Evaluation Rev. 39(3): 18 (2011) - [c6]Kejiang Ye, Xiaohong Jiang, Dawei Huang, Jianhai Chen, Bei Wang:
Live Migration of Multiple Virtual Machines with Resource Reservation in Cloud Computing Environments. IEEE CLOUD 2011: 267-274 - [c5]Xing Li, Qinming He, Jianhai Chen, Kejiang Ye, Ting Yin:
Informed Live Migration Strategies of Virtual Machines for Cluster Load Balancing. NPC 2011: 111-122 - [c4]Jianhai Chen, Dawei Huang, Bei Wang, Deshi Ye, Qinming He, Wenzhi Chen:
A Fine-Grained Performance-Based Decision Model for Virtualization Application Solution. TPCTC 2011: 180-195 - [c3]Dawei Huang, Deshi Ye, Qinming He, Jianhai Chen, Kejiang Ye:
Virt-LM: a benchmark for live migration of virtual machine. ICPE 2011: 307-316 - 2010
- [c2]Kejiang Ye, Jianhua Che, Xiaohong Jiang, Jianhai Chen, Xing Li:
vTestkit: A Performance Benchmarking Framework for Virtualization Environments. ChinaGrid 2010: 130-136 - [c1]Kejiang Ye, Xiaohong Jiang, Qinming He, Xing Li, Jianhai Chen:
Evaluate the Performance and Scalability of Image Deployment in Virtual Data Center. NPC 2010: 390-401
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-08 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint