​
Login / Signup
Chaoran Li
ORCID
Publication Activity (10 Years)
Years Active: 2005-2024
Publications (10 Years): 24
Top Topics
Bilingual Lexicon
Machine Learning
Likelihood Model
Neural Network
Top Venues
CoRR
IEEE Trans. Dependable Secur. Comput.
IEEE Access
IEEE Trans. Inf. Forensics Secur.
</>
Publications
</>
Chaoran Li
,
Shuting Li
,
Huinian Li
,
Yinghao Ye
,
Xiaohuan Lu
Deep Double Incomplete Multi-view Multi-label Classification via Graph-Constraint Learning.
ICIC (5)
(2024)
Chaoran Li
,
Chao Yan
,
Xiaojia Xiang
,
Jun Lai
,
Han Zhou
,
Dengqing Tang
HADGEO: Image Based 3-DoF Cross-View Geo-Localization with Hard Sample Mining.
ICASSP
(2024)
Na Li
,
Yiyang Qi
,
Chaoran Li
,
Zhiming Zhao
Active Learning for Data Quality Control: A Survey.
ACM J. Data Inf. Qual.
16 (2) (2024)
Xiaogang Zhu
,
Siyu Zhang
,
Chaoran Li
,
Sheng Wen
,
Yang Xiang
Fuzzing Android Native System Libraries via Dynamic Data Dependency Graph.
IEEE Trans. Inf. Forensics Secur.
19 (2024)
Chaoran Li
,
Lei Xie
,
Yanling Bu
,
Ming Zhao
,
Zhenjie Lin
,
Liming Wang
Poster:Multi-Modal-Based Video Stabilization for Mobile Devices in Dynamic Scenes.
ICDCS
(2023)
Chaoran Li
,
Penglong Jiang
,
Hui Zhou
,
Xiaofeng Wang
,
Xiongbo Zhao
HAW: Hardware-Aware Point Selection for Efficient Winograd Convolution.
IEEE Signal Process. Lett.
30 (2023)
Derui Wang
,
Chaoran Li
,
Sheng Wen
,
Surya Nepal
,
Yang Xiang
Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training.
IEEE Trans. Dependable Secur. Comput.
19 (2) (2022)
Derui Wang
,
Chaoran Li
,
Sheng Wen
,
Qing-Long Han
,
Surya Nepal
,
Xiangyu Zhang
,
Yang Xiang
Daedalus: Breaking Nonmaximum Suppression in Object Detection via Adversarial Examples.
IEEE Trans. Cybern.
52 (8) (2022)
Chaoran Li
,
Xiao Chen
,
Derui Wang
,
Sheng Wen
,
Muhammad Ejaz Ahmed
,
Seyit Camtepe
,
Yang Xiang
Backdoor Attack on Machine Learning Based Android Malware Detectors.
IEEE Trans. Dependable Secur. Comput.
19 (5) (2022)
Chaoran Li
,
Xiao Chen
,
Ruoxi Sun
,
Minhui Xue
,
Sheng Wen
,
Muhammad Ejaz Ahmed
,
Seyit Camtepe
,
Yang Xiang
Cross-language Android permission specification.
ESEC/SIGSOFT FSE
(2022)
Chaoran Li
,
E. Zhang
,
Jingti Han
Adoption of online follow-up service by patients: An empirical study based on the elaboration likelihood model.
Comput. Hum. Behav.
114 (2021)
Chaoran Li
,
Xiao Chen
,
Ruoxi Sun
,
Jason Xue
,
Sheng Wen
,
Muhammad Ejaz Ahmed
,
Seyit Camtepe
,
Yang Xiang
NatiDroid: Cross-Language Android Permission Specification.
CoRR
(2021)
Derui Wang
,
Chaoran Li
,
Sheng Wen
,
Surya Nepal
,
Yang Xiang
Man-in-the-Middle Attacks Against Machine Learning Classifiers Via Malicious Generative Models.
IEEE Trans. Dependable Secur. Comput.
18 (5) (2021)
Yixi Zhang
,
Xueliang Sun
,
Xiang Qin
,
Chaoran Li
,
Siwei Wang
,
Yi Xie
Tripod: Use Data Augmentation to Enhance Website Fingerprinting.
ISCC
(2021)
Chaoran Li
,
E. Zhang
,
Jusheng Liu
Analysis of Countries' Scientific Capability in Dual Scientific Roles.
IEEE Access
8 (2020)
Jusheng Liu
,
Changrui Yu
,
Chaoran Li
,
Jingti Han
Cooperation or Conflict in Doctor-Patient Relationship? An Analysis From the Perspective of Evolutionary Game.
IEEE Access
8 (2020)
Xiao Chen
,
Chaoran Li
,
Derui Wang
,
Sheng Wen
,
Jun Zhang
,
Surya Nepal
,
Yang Xiang
,
Kui Ren
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection.
IEEE Trans. Inf. Forensics Secur.
15 (2020)
Chunhui Deng
,
Huifang Deng
,
Chaoran Li
A Scholar Disambiguation Method Based on Heterogeneous Relation-Fusion and Attribute Enhancement.
IEEE Access
8 (2020)
Simon Cheng Liu
,
Chaoran Li
,
Yue Li
,
Heng Ma
,
Xiao Hou
,
Yiming Shen
,
Licong Wang
,
Ze Chen
,
Xianghao Guo
,
Hengtong Lu
,
Yu Du
,
Qinting Tang
Automatic generation of tower defense levels using PCG.
FDG
(2019)
Derui Wang
,
Chaoran Li
,
Sheng Wen
,
Surya Nepal
,
Yang Xiang
Man-in-the-Middle Attacks against Machine Learning Classifiers via Malicious Generative Models.
CoRR
(2019)
Derui Wang
,
Chaoran Li
,
Sheng Wen
,
Surya Nepal
,
Yang Xiang
Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples.
CoRR
(2019)
Xiao Chen
,
Chaoran Li
,
Derui Wang
,
Sheng Wen
,
Jun Zhang
,
Surya Nepal
,
Yang Xiang
,
Kui Ren
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection.
CoRR
(2018)
Derek Wang
,
Chaoran Li
,
Sheng Wen
,
Yang Xiang
,
Wanlei Zhou
,
Surya Nepal
Defensive Collaborative Multi-task Training - Defending against Adversarial Attack towards Deep Neural Networks.
CoRR
(2018)
Mingqian Zhao
,
Zhutian Chen
,
Ke Lu
,
Chaoran Li
,
Huamin Qu
,
Xiaojuan Ma
Blossom: Design of a Tangible Interface for Improving Intergenerational Communication for the Elderly.
ITAP
(2016)
Chaoran Li
,
Yun Liu
SRDA: Smart Reputation-Based Data Aggregation Protocol for Wireless Sensor Network.
Int. J. Distributed Sens. Networks
11 (2015)
Chaoran Li
,
Yun Liu
ESMART: Energy-Efficient Slice-Mix-Aggregate for Wireless Sensor Network.
Int. J. Distributed Sens. Networks
9 (2013)
Liang Zhang
,
Chaoran Li
,
Yanfei Xu
,
Baile Shi
An Efficient Solution to Factor Drifting Problem in the pLSA Model.
CIT
(2005)