default search action
Zibo Yi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Huijun Liu
, Bin Ji
, Jie Yu, Shasha Li, Jun Ma, Zibo Yi
, Mengxue Du
, Miaomiao Li, Jie Liu
, Zeyao Mo:
A More Context-Aware Approach for Textual Adversarial Attacks Using Probability Difference-Guided Beam Search. IEEE Trans. Knowl. Data Eng. 36(6): 2316-2328 (2024) - 2022
- [j4]Zibo Yi
, Jie Yu, Yusong Tan, Qingbo Wu:
Fine-tuning more stable neural text classifiers for defending word level adversarial attacks. Appl. Intell. 52(10): 11948-11965 (2022) - [j3]Huijun Liu
, Jie Yu, Jun Ma, Shasha Li, Bin Ji
, Zibo Yi, Miaomiao Li, Long Peng, Xiaodong Liu:
Textual adversarial attacks by exchanging text-self words. Int. J. Intell. Syst. 37(12): 12212-12234 (2022) - [j2]Zibo Yi
, Shasha Li, Jun Ma, Jie Yu, Yusong Tan, Qingbo Wu:
Towards an Efficient and Robust Adversarial Attack Against Neural Text Classifier. Int. J. Pattern Recognit. Artif. Intell. 36(11): 2253007:1-2253007:22 (2022) - [c11]Wuhang Lin, Shasha Li, Chen Zhang, Bin Ji, Jie Yu, Jun Ma, Zibo Yi:
SummScore: A Comprehensive Evaluation Metric for Summary Quality Based on Cross-Encoder. APWeb/WAIM (2) 2022: 69-84 - [c10]Mengxue Du, Shasha Li, Jie Yu, Jun Ma, Bin Ji, Huijun Liu, Wuhang Lin, Zibo Yi:
Topic-Grained Text Representation-Based Model for Document Retrieval. ICANN (3) 2022: 776-788 - [c9]Hao Xu, Long Peng, Xiaodong Liu, Menglin Zhang, Jun Ma, Jie Yu, Zibo Yi:
KylinTune: DQN-based Energy-efficient Model for Browser in Mobile Devices. IPCCC 2022: 254-262 - [i3]Mengxue Du, Shasha Li, Jie Yu, Jun Ma, Bin Ji, Huijun Liu, Wuhang Lin, Zibo Yi:
Topic-Grained Text Representation-based Model for Document Retrieval. CoRR abs/2207.04656 (2022) - [i2]Wuhang Lin, Shasha Li, Chen Zhang, Bin Ji, Jie Yu, Jun Ma, Zibo Yi:
SummScore: A Comprehensive Evaluation Metric for Summary Quality Based on Cross-Encoder. CoRR abs/2207.04660 (2022) - 2021
- [j1]Zibo Yi, Jie Yu, Yusong Tan, Qingbo Wu:
A Multimodal Adversarial Attack Framework Based on Local and Random Search Algorithms. Int. J. Comput. Intell. Syst. 14(1): 1934-1947 (2021) - [c8]Wuhang Lin, Jianling Li, Zibo Yi, Bin Ji, Shasha Li, Jie Yu, Jun Ma:
A Unified Summarization Model with Semantic Guide and Keyword Coverage Mechanism. ICANN (5) 2021: 333-344 - [c7]Xiaohu Du, Jie Yu, Shasha Li, Zibo Yi, Hai Liu, Jun Ma:
Combating Word-level Adversarial Text with Robust Adversarial Training. IJCNN 2021: 1-8 - 2020
- [c6]Xiaohu Du, Zibo Yi, Shasha Li, Jun Ma, Jie Yu, Yusong Tan, Qinbo Wu:
Generating More Effective and Imperceptible Adversarial Text Examples for Sentiment Classification. ICAIS (1) 2020: 422-433
2010 – 2019
- 2019
- [c5]Zibo Yi
, Jie Yu, Shasha Li, Yusong Tan, Qingbo Wu:
Incremental Learning of GAN for Detecting Multiple Adversarial Attacks. ICANN (3) 2019: 673-684 - 2018
- [c4]Dongyang Liang, Shasha Li, Bing Ji, Zibo Yi, Jie Yu, Jianfeng Zhang, Yusong Tan, Qingbo Wu:
Research on Matrix Multiplication Based WeChat Group Tagging Technology. AIKE 2018: 41-45 - [c3]Zibo Yi
, Shasha Li, Jie Yu, Yusong Tan, Qingbo Wu:
A Novel Misclassification Attack Against Black Box Neural Network Classifiers. SKG 2018: 38-45 - 2017
- [c2]Zibo Yi
, Shasha Li, Jie Yu, Yusong Tan, Qingbo Wu, Hong Yuan, Ting Wang:
Drug-Drug Interaction Extraction via Recurrent Neural Network with Multiple Attention Layers. ADMA 2017: 554-566 - [i1]Zibo Yi, Shasha Li, Jie Yu, Qingbo Wu:
Drug-drug Interaction Extraction via Recurrent Neural Network with Multiple Attention Layers. CoRR abs/1705.03261 (2017) - 2016
- [c1]Zibo Yi
, Jun Ma
, Lei Luo, Jie Yu, Qingbo Wu:
Improving JavaScript Malware Classifier's Security against Evasion by Particle Swarm Optimization. Trustcom/BigDataSE/ISPA 2016: 1734-1740
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-19 21:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint