default search action
Junjian Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j13]Anqing Zhang, Honglong Chen, Xiaomeng Wang, Junjian Li, Yudong Gao, Xingang Wang:
Defending against backdoor attack on deep neural networks based on multi-scale inactivation. Inf. Sci. 690: 121562 (2025) - 2024
- [j12]Junjian Li, Honglong Chen, Yudong Gao, Shaozhong Guo, Kai Lin, Yuping Liu, Peng Sun:
BABE: Backdoor attack with bokeh effects via latent separation suppression. Eng. Appl. Artif. Intell. 138: 109462 (2024) - [j11]Jianyao Yin, Honglong Chen, Junjian Li, Yudong Gao:
Enhanced Coalescence Backdoor Attack Against DNN Based on Pixel Gradient. Neural Process. Lett. 56(2): 114 (2024) - [j10]Huansheng Xue, Honglong Chen, Qiuli Dai, Kai Lin, Junjian Li, Zhe Li:
CSCT: Charging Scheduling for Maximizing Coverage of Targets in WRSNs. IEEE Trans. Comput. Soc. Syst. 11(3): 3049-3059 (2024) - [j9]Junjian Li, Honglong Chen, Peng Sun, Zhibo Wang, Zhichen Ni, Weifeng Liu:
Call White Black: Enhanced Image-Scaling Attack in Industrial Artificial Intelligence Systems. IEEE Trans. Ind. Informatics 20(4): 6222-6233 (2024) - [j8]Xiaomeng Wang, Honglong Chen, Peng Sun, Junjian Li, Anqing Zhang, Weifeng Liu, Nan Jiang:
AdvST: Generating Unrestricted Adversarial Images via Style Transfer. IEEE Trans. Multim. 26: 4846-4858 (2024) - [c10]Yudong Gao, Honglong Chen, Peng Sun, Junjian Li, Anqing Zhang, Zhibo Wang, Weifeng Liu:
A Dual Stealthy Backdoor: From Both Spatial and Frequency Perspectives. AAAI 2024: 1851-1859 - [c9]Yudong Gao, Honglong Chen, Peng Sun, Zhe Li, Junjian Li, Huajie Shao:
Energy-based Backdoor Defense without Task-Specific Samples and Model Retraining. ICML 2024 - 2023
- [c8]Chenhui Wang, Hulin Kuang, Jin Liu, Junjian Li, Hailin Yue, Jianxin Wang:
Domain-specific Knowledge Guided Self-supervised Learning for Pathological Image Segmentation. BIBM 2023: 1497-1502 - [c7]Hailin Yue, Jin Liu, Hulin Kuang, Jianhong Cheng, Junjian Li, Jianxin Wang:
A Fully Automated CT-Guided Learning for Survival Prediction of Esophageal Cancer. BIBM 2023: 1670-1675 - [c6]Jiahao Liu, Chao Li, Ruoyu Wang, Junjian Li, Wuhao Xia:
A Blockchain-Based Secure Data Sharing Approach with Proxy Re-Encryption. DSC 2023: 128-134 - [c5]Ruoyu Wang, Junjian Li, Chao Li, Naqin Zhou, Jiahao Liu:
A Trust Usage Control Approach for Media Player Based on Intel SGX. DSC 2023: 533-539 - [c4]Junjian Li, Honglong Chen, Yudong Gao, Kai Lin, Yuping Liu:
B³A: Bokeh Based Backdoor Attack with Feature Restrictions. MSN 2023: 677-684 - [i3]Yudong Gao, Honglong Chen, Peng Sun, Junjian Li, Anqing Zhang, Zhibo Wang:
A Dual Stealthy Backdoor: From Both Spatial and Frequency Perspectives. CoRR abs/2307.10184 (2023) - 2022
- [j7]Feng Liang, Honglong Chen, Kai Lin, Junjian Li, Zhe Li, Huansheng Xue, Vladimir V. Shakhov, Hannan Bin Liaqat:
Route recommendation based on temporal-spatial metric. Comput. Electr. Eng. 97: 107549 (2022) - [j6]Hailin Yue, Jin Liu, Junjian Li, Hulin Kuang, Jinyi Lang, Jianhong Cheng, Lin Peng, Yongtao Han, Harrison Bai, Yuping Wang, Qifeng Wang, Jianxin Wang:
MLDRL: Multi-loss disentangled representation learning for predicting esophageal cancer response to neoadjuvant chemoradiotherapy using longitudinal CT images. Medical Image Anal. 79: 102423 (2022) - [j5]Junjian Li, Jin Liu, Hailin Yue, Jianhong Cheng, Hulin Kuang, Harrison Bai, Yuping Wang, Jianxin Wang:
DARC: Deep adaptive regularized clustering for histopathological image classification. Medical Image Anal. 80: 102521 (2022) - [j4]Jianhong Cheng, Wei Zhao, Jin Liu, Xingzhi Xie, Shangjie Wu, Liangliang Liu, Hailin Yue, Junjian Li, Jianxin Wang, Jun Liu:
Automated Diagnosis of COVID-19 Using Deep Supervised Autoencoder With Multi-View Features From CT Images. IEEE ACM Trans. Comput. Biol. Bioinform. 19(5): 2723-2736 (2022) - [j3]Kai Lin, Honglong Chen, Na Yan, Zhe Li, Junjian Li, Nan Jiang:
Fast and Reliable Missing Tag Detection for Multiple-Group RFID Systems. IEEE Trans. Ind. Informatics 18(4): 2656-2664 (2022) - [j2]Honglong Chen, Zhe Li, Zhu Wang, Zhichen Ni, Junjian Li, Ge Xu, Abdul Aziz, Feng Xia:
Edge data based trailer inception probabilistic matrix factorization for context-aware movie recommendation. World Wide Web 25(5): 1863-1882 (2022) - [c3]Jiahui Zheng, Junjian Li, Chao Li, Ran Li:
A SQL Blind Injection Method Based on Gated Recurrent Neural Network. DSC 2022: 519-525 - [i2]Honglong Chen, Zhe Li, Zhu Wang, Zhichen Ni, Junjian Li, Ge Xu, Abdul Aziz, Feng Xia:
Edge Data Based Trailer Inception Probabilistic Matrix Factorization for Context-Aware Movie Recommendation. CoRR abs/2202.10236 (2022) - [i1]Junjian Li, Honglong Chen:
Adversarial RAW: Image-Scaling Attack Against Imaging Pipeline. CoRR abs/2206.01733 (2022) - 2020
- [c2]Hong-Dong Li, Rui Guo, Junjian Li, Jianxin Wang, Yi Pan, Jin Liu:
Joint Learning of Primary and Secondary Labels based on Multi-scale Representation for Alzheimer's Disease Diagnosis. BIBM 2020: 637-642
2010 – 2019
- 2017
- [j1]Wenchao Fang, Hanqiao Jiang, Junjian Li, Wenpei Miao, Kang Ma, Wu Xiao:
An intelligent production fluctuation monitoring system for giant oilfield development. Int. J. Embed. Syst. 9(1): 36-44 (2017) - 2010
- [c1]Qiang Ye, Junjian Li, Yanxia Jia, Hongwei Du:
GW-GEM: A Reliable Routing Algorithm for Wireless Sensor Networks. GLOBECOM 2010: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint