基于电商大数据的反作弊对抗学习理论与关键技术
序号 | 标题 | 类型 | 作者 |
---|---|---|---|
1 | Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications | 期刊论文 | Li Changjiang;Ji Shouling;Weng Haiqin;Li Bo;Shi Jie;Beyah Raheem;Guo Shanqing;Wang Zonghui;Wang Ting |
2 | Adversarial CAPTCHAs | 期刊论文 | Chenghui Shi;Xiaogang Xu;Shouling Ji;Kai Bu;Jianhai Chen;Raheem Beyah;Ting Wang |
3 | Multi-level Graph Matching Networks for Deep Graph Similarity Learning Systems | 期刊论文 | Xiang Ling;Lingfei Wu;Saizhuo Wang;Tengfei Ma;Fangli Xu;Chunming Wu;Shouling Ji |
4 | Online E-Commerce Fraud: A Large-scale Detection and Analysis | 会议论文 | Haiqin Weng;Zhao Li;Shouling Ji;Chen Chu;Haifeng Lu;Tianyu Du;Qinming He |
5 | Trojaning Language Models for Fun and Profit | 会议论文 | Xinyang Zhang;Zheng Zhang;Shouling Ji;Ting Wang |
6 | Multi-order Adversarial Representation Learning for Composed Query Image Retrieval | 会议论文 | Zhixiao Fu;Xinyuan Chen;Jianfeng Dong;Shouling Ji |
7 | 深度学习模型鲁棒性研究综述 | 期刊论文 | 纪守领;杜天宇;邓水光;程鹏;时杰;杨珉;李博 |
8 | Text Captcha Is Dead? A Large Scale Deployment and Empirical Study | 会议论文 | Chenghui Shi;Shouling Ji;Qianjun Liu;Changchang Liu;Yuefeng Chen;Yuan He;Zhe Liu;Raheem Beyah;Ting Wang |
9 | SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems | 会议论文 | Tianyu Du;Shouling Ji;Jinfeng Li;Qinchen Gu;Ting Wang;Raheem Beyah |
10 | Backdoor Pre-trained Models Can Transfer to All | 会议论文 | Lujia Shen;Shouling Ji;Xuhong Zhang;Jinfeng Li;Jing Chen;Jie Shi;Chengfang Fang;Jianwei Yin;Ting Wang |
11 | Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks | 会议论文 | Tianyu Du;Shouling Ji;Lujia Shen;Yao Zhang;Jinfeng Li;Jie Shi;Chengfang Fang;Jianwei Yin;Raheem Beyah;Ting Wang |
12 | 针对白盒场景的对抗音频生成方法及系统 | 专利 | 纪守领;杜天宇;李进锋;陈建海 |
13 | Deep Graph Matching and Searching for Semantic Code Retrieval | 期刊论文 | Xiang Ling;Lingfei Wu;Saizhuo Wang;Gaoning Pan;Tengfei Ma;Fangli Xu;Alex X. Liu;Chunming Wu;Shouling Ji |
14 | TEXTSHIELD: Robust text classification based on multimodal embedding and neural machine translation | 会议论文 | Jinfeng Li;Tianyu Du;Shouling Ji;Rong Zhang;Quan Lu;Min Yang;Ting Wang |
15 | Fast-RCM: Fast Tree based Unsupersived Rare Class Mining, IEEE Transactions on Cybernetics | 期刊论文 | Haiqin Weng;Shouling Ji;Changchang Liu;Ting Wang;Qinming He;Jianhai Chen |
16 | Attention with Long-Term Interval-Based Gated Recurrent Units for Modeling Sequential User Behaviors | 会议论文 | Zhao Li;Chenyi Lei;Pengcheng Zou;Donghui Ding;Shichang Hu;Zehong Hu;Shouling Ji;Jianliang Gao |
17 | Graph Backdoor | 会议论文 | Zhaohan Xi;Ren Pang;Shouling Ji;Ting Wang |
18 | Fine-Grained Fashion Similarity Learning by Attribute-Specific Embedding Network | 会议论文 | Zhe Ma;Jianfeng Dong;Zhongzi Long;Yao Zhang;Yuan He;Hui Xue;Shouling Ji |
19 | 一种电商安全相关实体的自动挖掘方法及系统 | 专利 | 纪守领;伍一鸣;陈建海;刘倩君 |
20 | 一种基于脆弱性学习的智能模糊测试方法与系统 | 专利 | 纪守领;李宇薇;陈建海;吕晨阳 |
21 | On the Security Risks of AutoML | 会议论文 | Ren Pang;Zhaohan Xi;Shouling Ji;Xiapu Luo;Ting Wang |
22 | 图像型验证码的安全性检测方法及系统 | 专利 | 纪守领;赵彬彬;翁海琴;陈建海 |
23 | DeepSec: A Uniform Platform for Security Analysis of Deep Learning Models | 会议论文 | Xiang Ling;Shouling Ji;Jiaxu Zou;Jiannan Wang;Chunming Wu;Bo Li;Ting Wang |
24 | Turbo: Fraud Detection in Deposit-free Leasing Service via Real-Time Behavior Network Mining | 会议论文 | Sihao Hu;Xuhong Zhang;Junfeng Zhou;Shouling Ji;Jiaqi Yuan;Zhao Li;Zhipeng Wang;Qi Chen;Qinming He;Liming Fang |
25 | Multi-level Alignment Network for Domain Adaptive Cross-modal Retrieval | 期刊论文 | Dong Jianfeng;Long Zhongzi;Mao Xiaofeng;Lin Changting;He Yuan;Ji Shouling |
26 | 一种集成攻击算法库的图数据隐私安全检测系统及检测方法 | 专利 | 纪守领;唐凯宇;陈建海 |
27 | Adversarial Examples Versus Cloud-based Detectors: A Black-box Empirical Study | 期刊论文 | Xurong Li;Shouling Ji;Meng Han;Juntao Ji;Zhenyu Ren;Yushan Liu;Chunming Wu |
28 | Adversarial Examples Detection through the Sensibility in Space Mappings | 期刊论文 | Xurong Li;Shouling Ji;Juntao Ji;Zhenyu Ren;Chunming Wu;Bo Li;Ting Wang |
29 | 基于评论数据的跨平台电商欺诈检测方法和系统 | 专利 | 纪守领;翁海琴;段辅正;陈建海;何钦铭 |
30 | TiSSA: A Time Slice Self-Attention Approach for Modeling Sequential User Behaviors | 会议论文 | Chenyi Lei;Zhao Li;Shouling Ji |
31 | 一种电商黑灰产舆情自动挖掘方法和系统 | 专利 | 纪守领;刘倩君;陈建海;伍一鸣 |
32 | 一种黑盒场景下的定向对抗音频生成方法及系统 | 专利 | 纪守领;杜天宇;李进锋;陈建海 |
33 | Dual Encoding for Zero-Example Video Retrieval | 会议论文 | Jianfeng Dong;Xirong Li;Chaoxi Xu;Shouling Ji;Yuan He;Gang Yang;Xun Wang |
34 | i-Algebra: Towards Interactive Interpretability of Deep Neural Networks | 会议论文 | Xinyang Zhang;Pang Ren;Shouling Ji;Fenglong Ma;Ting Wang |
35 | A Practical Black-box Attack on Source Code Authorship Identification Classifiers | 期刊论文 | Qianjun Liu;Shouling Ji;Changchang Liu;Chunming Wu |
36 | 一种基于层次化相似性学习的文本到商品图像的检索方法 | 专利 | 纪守领;马哲;刘丰豪;张旭鸿;董建锋;何源 |
37 | CATS: Cross-Platform E-commerce Fraud Detection | 会议论文 | Haiqin Weng;Shouling Ji;Fuzheng Duan;Zhao Li;Jianhai Chen;Qinming He;Ting Wang |
38 | Fine-Grained Fashion Similarity Prediction by Attribute-Specific Embedding Learning | 期刊论文 | Dong Jianfeng;Ma Zhe;Mao Xiaofeng;Yang Xun;He Yuan;Hong Richang;Ji Shouling |
39 | 基于粒子群优化的模糊测试变异调度方法和系统 | 专利 | 纪守领;吕晨阳;陈建海 |
40 | Price TAG: Towards Semi-Automatically Discovery Tactics, Techniques and Procedures OF E-Commerce Cyber Threat Intelligence | 期刊论文 | Yiming Wu;Qianjun Liu;Xiaojing Liao;Shouling Ji;Peng Wang;Xiaofeng Wang;Chunming Wu;Zhao Li |