default search action
Fei Kong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Liang Peng, Rongyao Hu, Fei Kong, Jiangzhang Gan, Yujie Mo, Xiaoshuang Shi, Xiaofeng Zhu:
Reverse Graph Learning for Graph Neural Network. IEEE Trans. Neural Networks Learn. Syst. 35(4): 4530-4541 (2024) - [c10]Fei Kong, Jinhao Duan, Lichao Sun, Hao Cheng, Renjing Xu, Hengtao Shen, Xiaofeng Zhu, Xiaoshuang Shi, Kaidi Xu:
ACT-Diffusion: Efficient Adversarial Consistency Training for One-Step Diffusion Models. CVPR 2024: 8890-8899 - [c9]Fei Kong, Jinhao Duan, Ruipeng Ma, Heng Tao Shen, Xiaoshuang Shi, Xiaofeng Zhu, Kaidi Xu:
An Efficient Membership Inference Attack for the Diffusion Model by Proximal Initialization. ICLR 2024 - 2023
- [j6]Fei Kong, Fangqi Liu, Kaidi Xu, Xiaoshuang Shi:
Why does batch normalization induce the model vulnerability on adversarial images? World Wide Web (WWW) 26(3): 1073-1091 (2023) - [c8]Jinhao Duan, Fei Kong, Shiqi Wang, Xiaoshuang Shi, Kaidi Xu:
Are Diffusion Models Vulnerable to Membership Inference Attacks? ICML 2023: 8717-8730 - [c7]Feiwen Zhu, Michal Futrega, Han Bao, Sukru Burc Eryilmaz, Fei Kong, Kefeng Duan, Xinnian Zheng, Nimrod Angel, Matthias Jouanneaux, Maxmilian Stadler, Michal Marcinkiewicz, Fung Xie, June Yang, Michael Andersch:
FastDimeNet++: Training DimeNet++ in 22 minutes. ICPP 2023: 274-284 - [i8]Jinhao Duan, Fei Kong, Shiqi Wang, Xiaoshuang Shi, Kaidi Xu:
Are Diffusion Models Vulnerable to Membership Inference Attacks? CoRR abs/2302.01316 (2023) - [i7]Fei Kong, Jinxi Xiang, Xiyue Wang, Xinran Wang, Meng Yue, Jun Zhang, Sen Yang, Junhan Zhao, Xiao Han, Yuhan Dong, Yueping Liu:
Federated contrastive learning models for prostate cancer diagnosis and Gleason grading. CoRR abs/2302.06089 (2023) - [i6]Fei Kong, Jinhao Duan, Ruipeng Ma, Hengtao Shen, Xiaofeng Zhu, Xiaoshuang Shi, Kaidi Xu:
An Efficient Membership Inference Attack for the Diffusion Model by Proximal Initialization. CoRR abs/2305.18355 (2023) - [i5]Ruipeng Ma, Jinhao Duan, Fei Kong, Xiaoshuang Shi, Kaidi Xu:
Exposing the Fake: Effective Diffusion-Generated Images Detection. CoRR abs/2307.06272 (2023) - [i4]Fei Kong, Jinhao Duan, Lichao Sun, Hao Cheng, Renjing Xu, Hengtao Shen, Xiaofeng Zhu, Xiaoshuang Shi, Kaidi Xu:
ACT: Adversarial Consistency Models. CoRR abs/2311.14097 (2023) - 2021
- [j5]Liang Peng, Fei Kong, Chongzhi Liu, Ping Kuang:
Robust and Dynamic Graph Convolutional Network For Multi-view Data Classification. Comput. J. 64(7): 1093-1103 (2021) - [c6]Gaochen Wu, Bin Xu, Yuxin Qin, Fei Kong, Bangchang Liu, Hongwen Zhao, Dejie Chang:
PatentMiner: Patent Vacancy Mining via Context-Enhanced and Knowledge-Guided Graph Attention. CCKS 2021: 227-239 - [c5]Dejie Chang, Mosha Chen, Chaozhen Liu, Liping Liu, Dongdong Li, Wei Li, Fei Kong, Bangchang Liu, Xiaobin Luo, Ji Qi, Qiao Jin, Bin Xu:
DiaKG: An Annotated Diabetes Dataset for Medical Knowledge Graph Construction. CCKS 2021: 308-314 - [i3]Dejie Chang, Mosha Chen, Chaozhen Liu, Liping Liu, Dongdong Li, Wei Li, Fei Kong, Bangchang Liu, Xiaobin Luo, Ji Qi, Qiao Jin, Bin Xu:
DiaKG: an Annotated Diabetes Dataset for Medical Knowledge Graph Construction. CoRR abs/2105.15033 (2021) - [i2]Gaochen Wu, Bin Xu, Yuxin Qin, Fei Kong, Bangchang Liu, Hongwen Zhao, Dejie Chang:
PatentMiner: Patent Vacancy Mining via Context-enhanced and Knowledge-guided Graph Attention. CoRR abs/2107.04880 (2021) - [i1]Gaochen Wu, Bin Xu, Yuxin Qin, Fei Kong, Bangchang Liu, Hongwen Zhao, Dejie Chang:
Improving Low-resource Reading Comprehension via Cross-lingual Transposition Rethinking. CoRR abs/2107.05002 (2021)
2010 – 2019
- 2019
- [j4]Yanting Wang, Zhiguo Hao, Baohui Zhang, Fei Kong:
A Pilot Protection Scheme for Transmission Lines in VSC-HVDC Grid Based on Similarity Measure of Traveling Waves. IEEE Access 7: 7147-7158 (2019) - [j3]Fei Kong, Jiangbo Li, Yumin Wang:
Human-computer interactive teaching model based on fuzzy set and BP neural network. J. Intell. Fuzzy Syst. 37(1): 103-113 (2019) - [j2]Fei Kong, Yumin Wang:
Design of computer interactive system for sports training based on artificial intelligence and improved support vector. J. Intell. Fuzzy Syst. 37(5): 6165-6175 (2019) - 2016
- [j1]Dinghui Wu, Shipeng Xu, Fei Kong:
Convergence Analysis and Improvement of the Chicken Swarm Optimization Algorithm. IEEE Access 4: 9400-9412 (2016) - 2013
- [c4]Fei Kong, Ming Xu, Yizhi Ren, Jian Xu, Haiping Zhang, Ning Zheng:
A Webmail Reconstructing Method from Windows XP Memory Dumps. MUE 2013: 211-217
2000 – 2009
- 2008
- [c3]Pin Tao, Fei Kong, Shi-Qiang Yang:
A Novel DPM Algorithm Based on the Hurst Probability. ICESS 2008: 175-180 - 2005
- [c2]Hongwei Jia, Weiqing Tang, Tao He, Fei Kong:
A conflict resolution methodology based on technology and sociology - a complex-system approach. CSCWD (1) 2005: 16-21 - [c1]Hongwei Jia, Weiqing Tang, Fei Kong, Tao He:
A Conflict Resolution Methodology in a Large-Scale CSCD System. CSCWD (Selected papers) 2005: 61-71
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint