default search action
Jinwen He
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Jinwen He, Hegui Zhu, Xv Zhou:
Quantum image encryption algorithm via optimized quantum circuit and parity bit-plane permutation. J. Inf. Secur. Appl. 81: 103698 (2024) - [j6]Hegui Zhu, Jiangxia Ge, Jinwen He, Libo Zhang:
A non-degenerate chaotic bits XOR system with application in image encryption. Math. Comput. Simul. 219: 231-250 (2024) - [j5]Jiehang Deng, Zihang Hu, Jinwen He, Jiaxin Liu, Guoqing Qiao, Guosheng Gu, Shaowei Weng:
Irregular feature enhancer for low-dose CT denoising. Multim. Syst. 30(6): 359 (2024) - [c8]Jinwen He, Yujia Gong, Zijin Lin, Cheng'an Wei, Yue Zhao, Kai Chen:
LLM Factoscope: Uncovering LLMs' Factual Discernment through Measuring Inner States. ACL (Findings) 2024: 10218-10230 - [c7]Zijin Lin, Yue Zhao, Kai Chen, Jinwen He:
I Don't Know You, But I Can Catch You: Real-Time Defense against Diverse Adversarial Patches for Object Detectors. CCS 2024: 3823-3837 - [i6]Zijin Lin, Yue Zhao, Kai Chen, Jinwen He:
I Don't Know You, But I Can Catch You: Real-Time Defense against Diverse Adversarial Patches for Object Detectors. CoRR abs/2406.10285 (2024) - 2023
- [j4]Xv Zhou, Jinwen He:
Quantum Image Encryption Algorithm Incorporating Bit-plane Color Representation and Real Ket Model. J. Cyber Secur. Mobil. 12(5): 757-784 (2023) - [c6]Jinwen He, Kai Chen, Guozhu Meng, Jiangshan Zhang, Congyi Li:
Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing. CCS 2023: 431-445 - [i5]Jinwen He, Kai Chen, Guozhu Meng, Jiangshan Zhang, Congyi Li:
Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing. CoRR abs/2309.05679 (2023) - [i4]Jinwen He, Yujia Gong, Kai Chen, Zijin Lin, Cheng'an Wei, Yue Zhao:
LLM Factoscope: Uncovering LLMs' Factual Discernment through Inner States Analysis. CoRR abs/2312.16374 (2023) - 2022
- [j3]Yingzhe He, Guozhu Meng, Kai Chen, Xingbo Hu, Jinwen He:
Towards Security Threats of Deep Learning Systems: A Survey. IEEE Trans. Software Eng. 48(5): 1743-1770 (2022) - 2021
- [c5]Yingzhe He, Guozhu Meng, Kai Chen, Xingbo Hu, Jinwen He:
DRMI: A Dataset Reduction Technology based on Mutual Information for Black-box Attacks. USENIX Security Symposium 2021: 1901-1918 - [i3]Yingzhe He, Guozhu Meng, Kai Chen, Jinwen He, Xingbo Hu:
DeepObliviate: A Powerful Charm for Erasing Data Residual Memory in Deep Neural Networks. CoRR abs/2105.06209 (2021) - [i2]Ruigang Liang, Ying Cao, Peiwei Hu, Jinwen He, Kai Chen:
Semantics-Recovering Decompilation through Neural Machine Translation. CoRR abs/2112.15491 (2021)
2010 – 2019
- 2019
- [j2]Rushi Lan, Jinwen He, Shouhua Wang, Yining Liu, Xiaonan Luo:
A Parameter-Selection-Based Chaotic System. IEEE Trans. Circuits Syst. II Express Briefs 66-II(2): 492-496 (2019) - [i1]Yingzhe He, Guozhu Meng, Kai Chen, Xingbo Hu, Jinwen He:
Towards Privacy and Security of Deep Learning Systems: A Survey. CoRR abs/1911.12562 (2019) - 2018
- [j1]Rushi Lan, Jinwen He, Shouhua Wang, Tianlong Gu, Xiaonan Luo:
Integrated chaotic systems for image encryption. Signal Process. 147: 133-145 (2018) - 2017
- [c4]Jinwen He, Rushi Lan, Shouhua Wang, Xiaonan Luo:
An Integrated Chaotic System with Application to Image Encryption. ICONIP (5) 2017: 837-847 - 2013
- [c3]LinLin Shen, Bojie Liu, Jinwen He:
A Boosted Cascade of Directional Local Binary Patterns for Multispectral Palmprint Recognition. CCBR 2013: 233-240 - 2011
- [c2]LinLin Shen, Jinwen He:
Face Recognition with Directional Local Binary Patterns. CCBR 2011: 10-16 - [c1]LinLin Shen, Jinwen He, Shipei Wu, Songhao Zheng:
Face Recognition from Visible and Near-Infrared Images Using Boosted Directional Binary Code. ICIC (2) 2011: 404-411
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint