Follow
Tingsong Jiang
Title
Cited by
Cited by
Year
Towards time-aware knowledge graph completion
T Jiang, T Liu, T Ge, L Sha, B Chang, S Li, Z Sui
Proceedings of COLING 2016, the 26th International Conference on …, 2016
1652016
Encoding temporal information for time-aware link prediction
T Jiang, T Liu, T Ge, L Sha, S Li, B Chang, Z Sui
Proceedings of the 2016 conference on empirical methods in natural language …, 2016
1272016
Fca: Learning a 3d full-coverage vehicle camouflage for multi-view physical adversarial attack
D Wang, T Jiang, J Sun, W Zhou, Z Gong, X Zhang, W Yao, X Chen
Proceedings of the AAAI conference on artificial intelligence 36 (2), 2414-2422, 2022
692022
Chinese semantic role labeling with bidirectional recurrent neural networks
Z Wang, T Jiang, B Chang, Z Sui
Proceedings of the 2015 Conference on Empirical Methods in Natural Language …, 2015
542015
An approximated gradient sign method using differential evolution for black-box adversarial attack
C Li, H Wang, J Zhang, W Yao, T Jiang
IEEE Transactions on Evolutionary Computation 26 (5), 976-990, 2022
382022
Ersom: A structural ontology matching approach using automatically learned entity representation
C Xiang, T Jiang, B Chang, Z Sui
Proceedings of the 2015 conference on empirical methods in natural language …, 2015
362015
A survey on physical adversarial attack in computer vision
D Wang, W Yao, T Jiang, G Tang, X Chen
arXiv preprint arXiv:2209.14262, 2022
252022
Adaptive momentum variance for attention-guided sparse adversarial attacks
C Li, W Yao, H Wang, T Jiang
Pattern Recognition 133, 108979, 2023
242023
Bayesian evolutionary optimization for crafting high-quality adversarial examples with limited query budget
C Li, W Yao, H Wang, T Jiang, X Zhang
Applied Soft Computing 142, 110370, 2023
152023
Rfla: A stealthy reflected light adversarial attack in the physical world
D Wang, W Yao, T Jiang, C Li, X Chen
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023
152023
Evolutionary game based access class barring for machine-to-machine communications
T Jiang, X Tan, X Luan, X Zhang, J Wu
16th International Conference on Advanced Communication Technology, 832-835, 2014
142014
Capturing argument relationship for Chinese semantic role labeling
L Sha, S Li, B Chang, Z Sui, T Jiang
Proceedings of the 2016 Conference on Empirical Methods in Natural Language …, 2016
132016
Adversarial patch attacks against aerial imagery object detectors
G Tang, T Jiang, W Zhou, C Li, W Yao, Y Zhao
Neurocomputing 537, 128-140, 2023
122023
Recognizing textual entailment using probabilistic inference
L Sha, S Li, B Chang, Z Sui, T Jiang
Proceedings of the 2015 Conference on Empirical Methods in Natural Language …, 2015
112015
Differential evolution based dual adversarial camouflage: Fooling human eyes and object detectors
J Sun, W Yao, T Jiang, D Wang, X Chen
Neural Networks 163, 256-271, 2023
102023
Revisiting distant supervision for relation extraction
T Jiang, J Liu, CY Lin, Z Sui
Proceedings of the Eleventh International Conference on Language Resources …, 2018
102018
HatchEnsemble: an efficient and practical uncertainty quantification method for deep neural networks
Y Xia, J Zhang, T Jiang, Z Gong, W Yao, L Feng
Complex & Intelligent Systems 7 (6), 2855-2869, 2021
72021
Adversarial infrared blocks: A multi-view black-box attack to thermal infrared detectors in physical world
C Hu, W Shi, T Jiang, W Yao, L Tian, X Chen, J Zhou, W Li
Neural Networks 175, 106310, 2024
62024
Improving transferability of universal adversarial perturbation with feature disruption
D Wang, W Yao, T Jiang, X Chen
IEEE Transactions on Image Processing, 2023
52023
Natural weather-style black-box adversarial attacks against optical aerial detectors
G Tang, W Yao, T Jiang, W Zhou, Y Yang, D Wang
IEEE Transactions on Geoscience and Remote Sensing, 2023
52023
The system can't perform the operation now. Try again later.
Articles 1–20