default search action
Chaoran Li
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Na Li, Yiyang Qi, Chaoran Li, Zhiming Zhao:
Active Learning for Data Quality Control: A Survey. ACM J. Data Inf. Qual. 16(2): 11:1-11:45 (2024) - [j13]Xiaogang Zhu, Siyu Zhang, Chaoran Li, Sheng Wen, Yang Xiang:
Fuzzing Android Native System Libraries via Dynamic Data Dependency Graph. IEEE Trans. Inf. Forensics Secur. 19: 3733-3744 (2024) - [c8]Chaoran Li, Chao Yan, Xiaojia Xiang, Jun Lai, Han Zhou, Dengqing Tang:
HADGEO: Image Based 3-DoF Cross-View Geo-Localization with Hard Sample Mining. ICASSP 2024: 3520-3524 - [c7]Chaoran Li, Shuting Li, Huinian Li, Yinghao Ye, Xiaohuan Lu:
Deep Double Incomplete Multi-view Multi-label Classification via Graph-Constraint Learning. ICIC (5) 2024: 442-456 - 2023
- [j12]Chaoran Li, Penglong Jiang, Hui Zhou, Xiaofeng Wang, Xiongbo Zhao:
HAW: Hardware-Aware Point Selection for Efficient Winograd Convolution. IEEE Signal Process. Lett. 30: 269-273 (2023) - [c6]Chaoran Li, Lei Xie, Yanling Bu, Ming Zhao, Zhenjie Lin, Liming Wang:
Poster:Multi-Modal-Based Video Stabilization for Mobile Devices in Dynamic Scenes. ICDCS 2023: 1-2 - 2022
- [j11]Derui Wang, Chaoran Li, Sheng Wen, Qing-Long Han, Surya Nepal, Xiangyu Zhang, Yang Xiang:
Daedalus: Breaking Nonmaximum Suppression in Object Detection via Adversarial Examples. IEEE Trans. Cybern. 52(8): 7427-7440 (2022) - [j10]Derui Wang, Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang:
Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training. IEEE Trans. Dependable Secur. Comput. 19(2): 953-965 (2022) - [j9]Chaoran Li, Xiao Chen, Derui Wang, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, Yang Xiang:
Backdoor Attack on Machine Learning Based Android Malware Detectors. IEEE Trans. Dependable Secur. Comput. 19(5): 3357-3370 (2022) - [c5]Chaoran Li, Xiao Chen, Ruoxi Sun, Minhui Xue, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, Yang Xiang:
Cross-language Android permission specification. ESEC/SIGSOFT FSE 2022: 772-783 - 2021
- [j8]Chaoran Li, E. Zhang, Jingti Han:
Adoption of online follow-up service by patients: An empirical study based on the elaboration likelihood model. Comput. Hum. Behav. 114: 106581 (2021) - [j7]Derui Wang, Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang:
Man-in-the-Middle Attacks Against Machine Learning Classifiers Via Malicious Generative Models. IEEE Trans. Dependable Secur. Comput. 18(5): 2074-2087 (2021) - [c4]Yixi Zhang, Xueliang Sun, Xiang Qin, Chaoran Li, Siwei Wang, Yi Xie:
Tripod: Use Data Augmentation to Enhance Website Fingerprinting. ISCC 2021: 1-7 - [i5]Chaoran Li, Xiao Chen, Ruoxi Sun, Jason Xue, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, Yang Xiang:
NatiDroid: Cross-Language Android Permission Specification. CoRR abs/2111.08217 (2021) - 2020
- [j6]Chaoran Li, E. Zhang, Jusheng Liu:
Analysis of Countries' Scientific Capability in Dual Scientific Roles. IEEE Access 8: 14545-14556 (2020) - [j5]Chunhui Deng, Huifang Deng, Chaoran Li:
A Scholar Disambiguation Method Based on Heterogeneous Relation-Fusion and Attribute Enhancement. IEEE Access 8: 28375-28384 (2020) - [j4]Jusheng Liu, Changrui Yu, Chaoran Li, Jingti Han:
Cooperation or Conflict in Doctor-Patient Relationship? An Analysis From the Perspective of Evolutionary Game. IEEE Access 8: 42898-42908 (2020) - [j3]Xiao Chen, Chaoran Li, Derui Wang, Sheng Wen, Jun Zhang, Surya Nepal, Yang Xiang, Kui Ren:
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection. IEEE Trans. Inf. Forensics Secur. 15: 987-1001 (2020)
2010 – 2019
- 2019
- [c3]Simon Cheng Liu, Chaoran Li, Yue Li, Heng Ma, Xiao Hou, Yiming Shen, Licong Wang, Ze Chen, Xianghao Guo, Hengtong Lu, Yu Du, Qinting Tang:
Automatic generation of tower defense levels using PCG. FDG 2019: 10:1-10:9 - [i4]Derui Wang, Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang:
Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples. CoRR abs/1902.02067 (2019) - [i3]Derui Wang, Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang:
Man-in-the-Middle Attacks against Machine Learning Classifiers via Malicious Generative Models. CoRR abs/1910.06838 (2019) - 2018
- [i2]Derek Wang, Chaoran Li, Sheng Wen, Yang Xiang, Wanlei Zhou, Surya Nepal:
Defensive Collaborative Multi-task Training - Defending against Adversarial Attack towards Deep Neural Networks. CoRR abs/1803.05123 (2018) - [i1]Xiao Chen, Chaoran Li, Derui Wang, Sheng Wen, Jun Zhang, Surya Nepal, Yang Xiang, Kui Ren:
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection. CoRR abs/1808.04218 (2018) - 2016
- [c2]Mingqian Zhao, Zhutian Chen, Ke Lu, Chaoran Li, Huamin Qu, Xiaojuan Ma:
Blossom: Design of a Tangible Interface for Improving Intergenerational Communication for the Elderly. ITAP 2016: 87-98 - 2015
- [j2]Chaoran Li, Yun Liu:
SRDA: Smart Reputation-Based Data Aggregation Protocol for Wireless Sensor Network. Int. J. Distributed Sens. Networks 11: 105364:1-105364:10 (2015) - 2013
- [j1]Chaoran Li, Yun Liu:
ESMART: Energy-Efficient Slice-Mix-Aggregate for Wireless Sensor Network. Int. J. Distributed Sens. Networks 9 (2013)
2000 – 2009
- 2005
- [c1]Liang Zhang, Chaoran Li, Yanfei Xu, Baile Shi:
An Efficient Solution to Factor Drifting Problem in the pLSA Model. CIT 2005: 175-181
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 19:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint