default search action
Chenyi Zhang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Chenyi Zhang, Yu Xue, Ferrante Neri, Xu Cai, Adam Slowik:
Multi-Objective Self-Adaptive Particle Swarm Optimization for Large-Scale Feature Selection in Classification. Int. J. Neural Syst. 34(3): 2450014:1-2450014:18 (2024) - [j26]Yu Xue, Chenyi Zhang:
A novel importance-guided particle swarm optimization based on MLP for solving large-scale feature selection problems. Swarm Evol. Comput. 91: 101760 (2024) - [j25]Deming Chu, Fan Zhang, Wenjie Zhang, Xuemin Lin, Ying Zhang, Yinglong Xia, Chenyi Zhang:
Discovering and Maintaining the Best $k$k in Core Decomposition. IEEE Trans. Knowl. Data Eng. 36(11): 5954-5971 (2024) - [j24]Yulin Bao, Chenyi Zhang, Kaile Su:
Call-Graph-Based Context-Sensitive Points-to Analysis for Java. IEEE Trans. Reliab. 73(2): 851-860 (2024) - [c46]Adam Bouland, Bill Fefferman, Soumik Ghosh, Tony Metger, Umesh V. Vazirani, Chenyi Zhang, Zixin Zhou:
Public-Key Pseudoentanglement and the Hardness of Learning Ground State Entanglement Structure. CCC 2024: 21:1-21:23 - [c45]Hao Wang, Chenyi Zhang, Tongyang Li:
Near-Optimal Quantum Algorithm for Minimizing the Maximal Loss. ICLR 2024 - [c44]Yexin Zhang, Chenyi Zhang, Cong Fang, Liwei Wang, Tongyang Li:
Quantum Algorithms and Lower Bounds for Finite-Sum Optimization. ICML 2024 - [c43]Scott Aaronson, Adam Bouland, Bill Fefferman, Soumik Ghosh, Umesh V. Vazirani, Chenyi Zhang, Zixin Zhou:
Quantum Pseudoentanglement. ITCS 2024: 2:1-2:21 - [c42]Jiachen Hu, Tongyang Li, Xinzhao Wang, Yecheng Xue, Chenyi Zhang, Han Zhong:
Quantum Non-Identical Mean Estimation: Efficient Algorithms and Fundamental Limits. TQC 2024: 9:1-9:21 - [i21]Hao Wang, Chenyi Zhang, Tongyang Li:
Near-Optimal Quantum Algorithm for Minimizing the Maximal Loss. CoRR abs/2402.12745 (2024) - [i20]Shuai Ma, Chenyi Zhang, Xinru Wang, Xiaojuan Ma, Ming Yin:
Beyond Recommender: An Exploratory Study of the Effects of Different AI Roles in AI-Assisted Decision Making. CoRR abs/2403.01791 (2024) - [i19]Chenyi Zhang, Yihan Hu, Henghui Ding, Humphrey Shi, Yao Zhao, Yunchao Wei:
Learning Trimaps via Clicks for Image Matting. CoRR abs/2404.00335 (2024) - [i18]Aditya Asgaonkar, Francesco D'Amato, Roberto Saltini, Luca Zanolini, Chenyi Zhang:
A Confirmation Rule for the Ethereum Consensus Protocol. CoRR abs/2405.00549 (2024) - [i17]Chenyi Zhang, Tongyang Li:
Comparisons Are All You Need for Optimizing Smooth Functions. CoRR abs/2405.11454 (2024) - [i16]Yexin Zhang, Chenyi Zhang, Cong Fang, Liwei Wang, Tongyang Li:
Quantum Algorithms and Lower Bounds for Finite-Sum Optimization. CoRR abs/2406.03006 (2024) - 2023
- [j23]Fangzhen Zhao, Chenyi Zhang, Naipeng Dong, Ming Li:
Adversarial Detection from Derived Models. Int. J. Pattern Recognit. Artif. Intell. 37(15): 2350031:1-2350031:30 (2023) - [j22]Ming Li, Chenyi Zhang, Qin Li, Shuangqin Cheng:
Monotonic learning with hypothesis evolution. Inf. Sci. 647: 119455 (2023) - [j21]Yu Xue, Chenyi Zhang, Ferrante Neri, Moncef Gabbouj, Yong Zhang:
An external attention-based feature ranker for large-scale feature selection. Knowl. Based Syst. 281: 111084 (2023) - [c41]Chenyi Zhang, Tongyang Li:
Quantum Lower Bounds for Finding Stationary Points of Nonconvex Functions. ICML 2023: 41268-41299 - [c40]Aaron Sidford, Chenyi Zhang:
Quantum speedups for stochastic optimization. NeurIPS 2023 - [i15]Aaron Sidford, Chenyi Zhang:
Quantum speedups for stochastic optimization. CoRR abs/2308.01582 (2023) - [i14]Adam Bouland, Bill Fefferman, Soumik Ghosh, Tony Metger, Umesh V. Vazirani, Chenyi Zhang, Zixin Zhou:
Public-key pseudoentanglement and the hardness of learning ground state entanglement structure. CoRR abs/2311.12017 (2023) - 2022
- [j20]Weizhen Xu, Chenyi Zhang, Fangzhen Zhao, Liangda Fang:
A Mask-Based Adversarial Defense Scheme. Algorithms 15(12): 461 (2022) - [j19]Fangzhen Zhao, Chenyi Zhang, Naipeng Dong, Zefeng You, Zhenxin Wu:
A Uniform Framework for Anomaly Detection in Deep Neural Networks. Neural Process. Lett. 54(4): 3467-3488 (2022) - [j18]Andrew M. Childs, Jiaqi Leng, Tongyang Li, Jin-Peng Liu, Chenyi Zhang:
Quantum simulation of real-space dynamics. Quantum 6: 860 (2022) - [j17]Chenyi Zhang, Jun Pang:
Modal characterisation of simulation relations in probabilistic concurrent games. Sci. Comput. Program. 215: 102762 (2022) - [c39]Yulin Bao, Chenyi Zhang, Xilong Zhuo, Yongliang Wang:
Parameter Sensitive Pointer Analysis for Java. ICECCS 2022: 162-167 - [c38]Chenyi Zhang:
Comparison Between Montelukast Sodium and Tiotropium Bromide for Asthma Treatment. ISAIMS 2022: 263-268 - [c37]Yaju Li, Chenyi Zhang, Qin Li:
Taint Trace Analysis For Java Web Applications. SEKE 2022: 184-189 - [i13]Andrew M. Childs, Jiaqi Leng, Tongyang Li, Jin-Peng Liu, Chenyi Zhang:
Quantum simulation of real-space dynamics. CoRR abs/2203.17006 (2022) - [i12]Weizhen Xu, Chenyi Zhang, Fangzhen Zhao, Liangda Fang:
A Mask-Based Adversarial Defense Scheme. CoRR abs/2204.11837 (2022) - [i11]Weiyuan Gong, Chenyi Zhang, Tongyang Li:
Robustness of Quantum Algorithms for Nonconvex Optimization. CoRR abs/2212.02548 (2022) - [i10]Chenyi Zhang, Tongyang Li:
Quantum Lower Bounds for Finding Stationary Points of Nonconvex Functions. CoRR abs/2212.03906 (2022) - 2021
- [j16]Chenyi Zhang, Jiaqi Leng, Tongyang Li:
Quantum algorithms for escaping from saddle points. Quantum 5: 529 (2021) - [c36]Chenyi Zhang, Tongyang Li:
Escape saddle points by a simple gradient-descent based algorithm. NeurIPS 2021: 8545-8556 - [i9]Fangzhen Zhao, Chenyi Zhang, Naipeng Dong, Zefeng You, Zhenxin Wu:
A Uniform Framework for Anomaly Detection in Deep Neural Networks. CoRR abs/2110.03092 (2021) - [i8]Chenyi Zhang, Tongyang Li:
Escape saddle points by a simple gradient-descent based algorithm. CoRR abs/2111.14069 (2021) - 2020
- [j15]Chenyi Zhang:
Minimal consistent DFA from sample strings. Acta Informatica 57(3-5): 657-670 (2020) - [j14]Xilong Zhuo, Chenyi Zhang:
TFA: an efficient and precise virtual method call resolution for Java. Formal Aspects Comput. 32(4-6): 395-416 (2020) - [j13]Chenyi Zhang, Jun Pang:
Preface for the special issue of the 12th International Symposium on Theoretical Aspects of Software Engineering (TASE 2018). Sci. Comput. Program. 187: 102375 (2020) - [c35]Yi Lu, Chenyi Zhang:
Nontransitive Security Types for Coarse-grained Information Flow Control. CSF 2020: 199-213 - [c34]Deming Chu, Fan Zhang, Xuemin Lin, Wenjie Zhang, Ying Zhang, Yinglong Xia, Chenyi Zhang:
Finding the Best k in Core Decomposition: A Time and Space Optimal Solution. ICDE 2020: 685-696 - [c33]Chenyi Zhang, Jun Pang:
Characterising Probabilistic Alternating Simulation for Concurrent Games. TASE 2020: 121-128 - [i7]Chenyi Zhang, Jiaqi Leng, Tongyang Li:
Quantum Algorithms for Escaping from Saddle Points. CoRR abs/2007.10253 (2020)
2010 – 2019
- 2019
- [c32]Xilong Zhuo, Chenyi Zhang:
A Relational Static Semantics for Call Graph Construction. ICFEM 2019: 322-335 - [i6]Chenyi Zhang, Jun Pang:
Characterising Probabilistic Alternating Simulation for Concurrent Games. CoRR abs/1907.03928 (2019) - [i5]Xilong Zhuo, Chenyi Zhang:
A Relational Static Semantics for Call Graph Construction. CoRR abs/1907.06522 (2019) - 2018
- [j12]Roberto Amadini, Graeme Gange, François Gauthier, Alexander Jordan, Peter Schachte, Harald Søndergaard, Peter J. Stuckey, Chenyi Zhang:
Reference Abstract Domains and Applications to String Analysis. Fundam. Informaticae 158(4): 297-326 (2018) - [e1]Jun Pang, Chenyi Zhang, Jifeng He, Jian Weng:
2018 International Symposium on Theoretical Aspects of Software Engineering, TASE 2018, Guangzhou, China, August 29-31, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-7305-8 [contents] - 2017
- [c31]Patrick Doolan, Graeme Smith, Chenyi Zhang, Padmanabhan Krishnan:
Improving the Scalability of Automatic Linearizability Checking in SPIN. ICFEM 2017: 105-121 - [c30]Roberto Amadini, Alexander Jordan, Graeme Gange, François Gauthier, Peter Schachte, Harald Søndergaard, Peter J. Stuckey, Chenyi Zhang:
Combining String Abstract Domains for JavaScript Analysis: An Evaluation. TACAS (1) 2017: 41-57 - 2016
- [j11]Chenyi Zhang, Ke Wang:
POI recommendation through cross-region collaborative filtering. Knowl. Inf. Syst. 46(2): 369-387 (2016) - [j10]Franck Cassez, Ron van der Meyden, Chenyi Zhang:
The complexity of synchronous notions of information flow security. Theor. Comput. Sci. 631: 16-42 (2016) - [j9]Chenyi Zhang, Hongwei Liang, Ke Wang:
Trip Recommendation Meets Real-World Constraints: POI Availability, Diversity, and Traveling Time Uncertainty. ACM Trans. Inf. Syst. 35(1): 5:1-5:28 (2016) - 2015
- [j8]Xueyi Zhao, Chenyi Zhang, Zhongfei Zhang:
Distributed cross-media multiple binary subspace learning. Int. J. Multim. Inf. Retr. 4(2): 153-164 (2015) - [j7]Lijun Wu, Kaile Su, Shaowei Cai, Xiaosong Zhang, Chenyi Zhang, Shupeng Wang:
An I/O Efficient Approach for Detecting All Accepting Cycles. IEEE Trans. Software Eng. 41(8): 730-744 (2015) - [c29]Chenyi Zhang, Ke Wang, Ee-Peng Lim, Qinneng Xu, Jianling Sun, Hongkun Yu:
Are Features Equally Representative? A Feature-Centric Recommendation. AAAI 2015: 389-395 - [c28]Chenyi Zhang, Hongwei Liang, Ke Wang, Jianling Sun:
Personalized Trip Recommendation with POI Availability and Uncertain Traveling Time. CIKM 2015: 911-920 - 2014
- [c27]Chenyi Zhang, Xueyi Zhao, Ke Wang, Jianling Sun:
Content + Attributes: A Latent Factor Model for Recommending Scientific Papers in Heterogeneous Academic Networks. ECIR 2014: 39-50 - [c26]Xueyi Zhao, Chenyi Zhang, Zhongfei Zhang:
Distributed Binary Subspace Learning on large-scale cross media data. ICME 2014: 1-6 - [c25]Xin Xia, David Lo, Xingen Wang, Chenyi Zhang, Xinyu Wang:
Cross-language bug localization. ICPC 2014: 275-278 - [c24]Chenyi Zhang, Ke Wang, Hongkun Yu, Jianling Sun, Ee-Peng Lim:
Latent Factor Transition for Dynamic Collaborative Filtering. SDM 2014: 452-460 - [p1]Chenyi Zhang, Jianling Sun, Ke Wang:
Latent Tunnel Based Information Propagation in Microblog Networks. Social Network Analysis 2014: 219-241 - [i4]Franck Cassez, Ron van der Meyden, Chenyi Zhang:
The Complexity of Synchronous Notions of Information Flow Security. CoRR abs/1402.0601 (2014) - 2013
- [j6]Zhiyuan Liu, Jun Pang, Chenyi Zhang:
Design and formal verification of a CEM protocol with transparent TTP. Frontiers Comput. Sci. 7(2): 279-297 (2013) - [j5]Ron van der Meyden, Chenyi Zhang:
Information flow in systems with schedulers, Part I: Definitions. Theor. Comput. Sci. 467: 68-88 (2013) - [j4]Ron van der Meyden, Chenyi Zhang:
Information flow in systems with schedulers, Part II: Refinement. Theor. Comput. Sci. 484: 70-92 (2013) - [c23]Chenyi Zhang, Jianling Sun, Ke Wang:
Information propagation in microblog networks. ASONAM 2013: 190-196 - [c22]Kirsten Winter, Chenyi Zhang, Ian J. Hayes, Nathan Keynes, Cristina Cifuentes, Lian Li:
Path-Sensitive Data Flow Analysis Simplified. ICFEM 2013: 415-430 - 2012
- [j3]Ying Zhang, Chenyi Zhang, Jun Pang, Sjouke Mauw:
Game-based verification of contract signing protocols with minimal messages. Innov. Syst. Softw. Eng. 8(2): 111-124 (2012) - [j2]Yanjie Sun, Chenyi Zhang, Jun Pang, Baptiste Alcalde, Sjouke Mauw:
A trust-augmented voting scheme for collaborative privacy management. J. Comput. Secur. 20(4): 437-459 (2012) - [c21]Xiaowei Huang, Kaile Su, Chenyi Zhang:
Probabilistic Alternating-Time Temporal Logic of Incomplete Information and Synchronous Perfect Recall. AAAI 2012: 765-771 - [c20]Kai Engelhardt, Ron van der Meyden, Chenyi Zhang:
Intransitive noninterference in nondeterministic systems. CCS 2012: 869-880 - [c19]Yi Lu, John Potter, Chenyi Zhang, Jingling Xue:
A Type and Effect System for Determinism in Multithreaded Programs. ESOP 2012: 518-538 - [c18]Surinder Kumar Jain, Chenyi Zhang, Bernhard Scholz:
Translating flowcharts to non-deterministic languages. PEPM 2012: 155-162 - [c17]Chenyi Zhang, Jun Pang:
An Algorithm for Probabilistic Alternating Simulation. SOFSEM 2012: 431-442 - [c16]Chenyi Zhang, Jianling Sun:
Large scale microblog mining using distributed MB-LDA. WWW (Companion Volume) 2012: 1035-1042 - 2011
- [c15]Chenyi Zhang:
Conditional Information Flow Policies and Unwinding Relations. TGC 2011: 227-241 - [i3]Chenyi Zhang, Jun Pang:
An Algorithm for Probabilistic Alternating Simulation. CoRR abs/1106.1978 (2011) - 2010
- [j1]Ron van der Meyden, Chenyi Zhang:
A comparison of semantic models for noninterference. Theor. Comput. Sci. 411(47): 4123-4147 (2010) - [c14]Zhiyuan Liu, Jun Pang, Chenyi Zhang:
Extending a Key-Chain Based Certified Email Protocol with Transparent TTP. EUC 2010: 630-636 - [c13]Franck Cassez, Ron van der Meyden, Chenyi Zhang:
The Complexity of Synchronous Notions of Information Flow Security. FoSSaCS 2010: 282-296 - [c12]Chenyi Zhang, Jun Pang:
On Probabilistic Alternating Simulations. IFIP TCS 2010: 71-85 - [c11]Yanjie Sun, Chenyi Zhang, Jun Pang, Baptiste Alcalde, Sjouke Mauw:
A Trust-Augmented Voting Scheme for Collaborative Privacy Management. STM 2010: 132-146 - [c10]Zhiyuan Liu, Jun Pang, Chenyi Zhang:
Verification of A Key Chain Based TTP Transparent CEM Protocol. TTSS 2010: 51-65 - [i2]Chenyi Zhang, Jun Pang:
On Probabilistic Alternating Simulations. CoRR abs/1003.0788 (2010) - [i1]Chenyi Zhang:
Unwinding Conditional Noninterference. CoRR abs/1003.3893 (2010)
2000 – 2009
- 2009
- [b1]Chenyi Zhang:
Information flow security - models, verification and schedulers. University of New South Wales, Sydney, Australia, 2009 - [c9]Ying Zhang, Chenyi Zhang, Jun Pang, Sjouke Mauw:
Game-Based Verification of Multi-Party Contract Signing Protocols. Formal Aspects in Security and Trust 2009: 186-200 - [c8]Jun Pang, Chenyi Zhang:
How to Work with Honest but Curious Judges? (Preliminary Report). SECCO 2009: 31-45 - 2008
- [c7]Ron van der Meyden, Chenyi Zhang:
Information Flow in Systems with Schedulers. CSF 2008: 301-312 - [c6]Bernhard Scholz, Chenyi Zhang, Cristina Cifuentes:
User-Input Dependence Analysis via Graph Reachability. SCAM 2008: 25-34 - 2007
- [c5]Yuxin Deng, Rob J. van Glabbeek, Carroll Morgan, Chenyi Zhang:
Scalar Outcomes Suffice for Finitary Probabilistic Testing. ESOP 2007: 363-378 - [c4]Yuxin Deng, Rob J. van Glabbeek, Matthew Hennessy, Carroll Morgan, Chenyi Zhang:
Characterising Testing Preorders for Finite Probabilistic Processes. LICS 2007: 313-325 - [c3]Yuxin Deng, Rob J. van Glabbeek, Matthew Hennessy, Carroll Morgan, Chenyi Zhang:
Remarks on Testing Probabilistic Processes. Computation, Meaning, and Logic 2007: 359-397 - 2006
- [c2]Ron van der Meyden, Chenyi Zhang:
A Comparison of Semantic Models for Noninterference. Formal Aspects in Security and Trust 2006: 235-249 - [c1]Ron van der Meyden, Chenyi Zhang:
Algorithmic Verification of Noninterference Properties. VODCA@FOSAD 2006: 61-75
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-03 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint