发表论文
[1] 董业, 陈小军. FlexBNN: Fast Private Binary Neural Network Inference With Flexible Bit-Width. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2023, 第 2 作者 通讯作者 18: 2382-2397, https://dl.acm.org/doi/abs/10.1109/TIFS.2023.3265342.[2] 董业, 陈小军, 井渭展, 李开运, 王伟平. Meteor: Improved Secure 3-Party Neural Network Inference with Reducing Online Communication Costs. 万维网国际会议 2023. 2023, 第 2 作者 通讯作者 https://dl.acm.org/doi/pdf/10.1145/3543507.3583272.[3] 26th European Conference on Artificial Intelligence ECAI 2023. 2023, 通讯作者 [4] 李晓颖, 陈小军, 王少璞, 丁阳阳, 李开运. Multi-initial-Center Federated Learning with Data Distribution Similarity-Aware Constraint. ICA3PP 2022. 2022, 第 2 作者 通讯作者 https://link.springer.com/chapter/10.1007/978-3-031-22677-9_41.[5] 王少璞, 李晓颖, 张嘉欣, 陈小军, 时金桥. Improved Network Pruning via Similarity-Based Regularization. PRICAI 2022. 2022, 第 4 作者 通讯作者 https://link.springer.com/chapter/10.1007/978-3-031-20865-2_31.[6] Zang SN, Chuang Zhang, Xiaojun Liu, Xiaojun Chen, Peng Zhang, Jie Liu. NEWSFARM: A Large-Scale Chinese Corpus of Long News Summarization. ICPR. 2022, 第 4 作者https://ieeexplore.ieee.org/document/9956691.[7] 王少璞, 陈小军. PrUE: Distilling Knowledge from Sparse Teacher Networks. ECML-PKDD 2023. 2022, 第 2 作者 通讯作者 https://arxiv.org/pdf/2207.00586.pdf.[8] Computer Vision and Pattern Recognition Conference(CVPR 2022). 2022, 通讯作者 [9] 陈小军. 抗图结构扰动的鲁棒节点表示学习. Information Sciences(CCF-B, Trans). 2021, 第 1 作者[10] 陈小军. 细粒度实体分类中用关系归纳偏置来加强标签表示. International Joint Conferences on Artificial Intelligence(IJCAI,CCF-A,Conf). 2021, 第 1 作者[11] 李金鹏, 张闯, 陈小军, 胡玥, 廖鹏程. 自动文本摘要研究综述. 计算机研究与发展[J]. 2021, 第 3 作者58(1): 1-21, http://lib.cqvip.com/Qikan/Article/Detail?id=7103712550.[12] Zhao, Zhendong, Chen, Xiaojun, Wang, Dakui, Xuan, Yuexin, Xiong, Gang. Robust node embedding against graph structural perturbations. INFORMATION SCIENCES[J]. 2021, 第 2 作者 通讯作者 566: 165-177, http://dx.doi.org/10.1016/j.ins.2021.02.046.[13] 李锦清, 陈小军, 王大魁, 李毓伟. Enhancing Label Representations with Relational Inductive Bias Constraint for FineGrained Entity Typing. International Joint Conference on Artificial Intelligence. 2021, 第 2 作者 通讯作者 [14] 26th European Symposium on Research in Computer Security (ESORICS) 2021. 2021, 通讯作者 [15] 董业, 侯炜, 陈小军, 曾帅. 基于秘密分享和梯度选择的高效安全联邦学习. 计算机研究与发展[J]. 2020, 第 3 作者57(10): 2241-2250, http://lib.cqvip.com/Qikan/Article/Detail?id=7102892130.[16] Li, Jinpeng, Zhang, Chuang, Chen, Xiaojun, Cao, Yanan, Jia, Ruipeng, IEEE. Improving Abstractive Summarization with Iterative Representation. IJCNN[J]. 2020, 第 3 作者[17] 陈小军. CTLS: 一个新的中文长文文本摘要数据集. CCF International Conference on Natural Language Processing and Chinese Computing(ICNLP,CCF-C,Conf). 2020, 第 1 作者[18] Dong, Ye, Chen, Xiaojun, Shen, Liyan, Wang, Dakui. EaSTFLy: Efficient and secure ternary federated learning. COMPUTERS & SECURITY[J]. 2020, 第 2 作者 通讯作者 94: http://dx.doi.org/10.1016/j.cose.2020.101824.[19] 陈小军. EaSTFLy:有效安全的三值量化联邦学习. COMPUTERSSECURITYCCFBTRANS. 2020, 第 1 作者[20] 侯炜, 王大魁, 陈小军. Generate images with obfuscated attributes for private image classifcation. MultiMedia Modeling International Conference. 2020, 第 3 作者[21] 陈小军. 共享词敏感的序列特征抽取模型. European Conference on Artificial Intelligence(ECAI, CCF-B, Conf). 2020, 第 1 作者[22] 陈小军. 利用历史聚合提高抽象文本摘要. International Joint Conference on Neural Networks (IJCNN, CCF-C, Conf). 2020, 第 1 作者[23] 李锦清, 王大魁, 陈小军, 廖鹏程, 陈淑娟. A Shared-Word Sensitive Sequence-toSequence Feature Extractor for Sentences Matching. European Conference on Artificial Intelligence. 2020, 第 3 作者[24] 陈小军. 为隐私图像分类生成带混淆属性的图片. MultiMedia Modeling(MMM, CCF-C, Conf). 2020, 第 1 作者[25] 陈小军. 利用迭代表示来提高抽象文本摘要. International Joint Conference on Neural Networks (IJCNN,CCF-C, Conf). 2020, 第 1 作者[26] 陈小军. 一个有效的三方神经网络推理框架. European Symposium on Research in Computer Security(ESORICS,CCF-B, Conf). 2020, 第 1 作者[27] 陈小军. 用多头注意力机制做抽象文本摘要. International joint conference on neural networks(IJCNN). 2019, 第 1 作者[28] Li, Jinpeng, Zhang, Chuang, Chen, Xiaojun, Cao, Yanan, Liao, Pengcheng, Zhang, Peng, IEEE. Abstractive Text Summarization with Multi-Head Attention. IJCNN[J]. 2019, 第 3 作者[29] Zhang, Kaihang, Zhang, Chuang, Chen, Xiaojun, Tan, Jianlong, Shi, Y, Fu, H, Tian, Y, Krzhizhanovskaya, VV, Lees, MH, Dongarra, J, Sloot, PMA. Automatic Web News Extraction Based on DS Theory Considering Content Topics. COMPUTATIONAL SCIENCE - ICCS 2018, PT I[J]. 2018, 第 3 作者10860: 194-207, [30] 陈小军. Cloud-MOM: 一个基于内容的实时云消息中间件. International Conference on High Performance Computing and Communications(HPCC-2018). 2018, 第 1 作者[31] 陈小军. 基因计算中有效且隐私的集合交集计算. International Conference on Bioinformatics and Biomedicine. 2018, 第 1 作者[32] Ding Hong, Zhang Chuang, Chen Xiaojun, Shi Jinqiao, Wang Wenan, IEEE. Cloud-MOM: A Content-Based Real-Time Message-Oriented Middleware for Cloud. IEEE 20TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS / IEEE 16TH INTERNATIONAL CONFERENCE ON SMART CITY / IEEE 4TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS)[J]. 2018, 第 3 作者750-757, http://dx.doi.org/10.1109/HPCC/SmartCity/DSS.2018.00128.[33] 陈小军. 用词性标注提高词移距离的方法. The 24th International Conference on Pattern Recognition(ICPR). 2018, 第 1 作者[34] 廖鹏程, 陈小军, 申立艳, 时金桥. 基于OT协议的外包隐私集合交集计算协议. 信息技术与网络安全[J]. 2018, 第 2 作者37(6): 28-31, http://lib.cqvip.com/Qikan/Article/Detail?id=675808253.[35] 申立艳, 陈小军, 时金桥, 胡兰兰. 隐私保护集合交集计算技术研究综述. 计算机研究与发展[J]. 2017, 第 2 作者54(10): 2153-2169, http://lib.cqvip.com/Qikan/Article/Detail?id=673516463.[36] 陈小军. 高效可扩展的隐私保护相似文档检测. IEEE GlobelCom. 2017, 第 1 作者[37] 陈小军. Memory Chunking Analysis Of Numerical Passwords. MILCOM2016. 2016, 第 1 作者[38] Xu Rui, Chen Xiaojun, Wang Yingbing, Shi Jinqiao, Mi Haitao, IEEE. Memory Chunking Analysis of Numerical Password for Chinese Websites. MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE. 2016, 第 2 作者788-793, [39] Pu Yiguo, Shi Jinqiao, Chen Xiaojun, Guo Li, Liu Tingwen, IEEE. Towards Misdirected Email Detection Based on Multi-attributes. 2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC). 2015, 第 3 作者796-802, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000380481500127.[40] Zhang Rui, Chen Xiaojun, Shi Jinqiao, Xu Fei, Pu Yiguo, Han W, Huang Z, Hu C, Zhang H, Guo L. Detecting Insider Threat Based on Document Access Behavior Analysis. WEB TECHNOLOGIES AND APPLICATIONS, APWEB 2014, PT II. 2014, 第 2 作者8710: 376-387, [41] 谭庆丰, 方滨兴, 时金桥, 徐钒文, 陈小军. StegoP2P:一种基于P2P网络的隐蔽通信方法. 计算机研究与发展[J]. 2014, 第 5 作者51(8): 1695-1703, http://lib.cqvip.com/Qikan/Article/Detail?id=661863761.[42] Chen Xiaojun, Shi Jinqiao, Xu Rui, Yiu S M, Fang Bingxing, Xu Fei, Batten L, Li G, Niu W, Warren M. PAITS: Detecting Masquerader via Short-Lived Interventional Mouse Dynamics. APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2014. 2014, 第 1 作者490: 231-242, [43] 时金桥. Winnowing Double Structure for Wildcard Query in Payload Attribution. ISC. 2014, [44] 陈小军. Definition of Evaluation Index Model for Network Management System. DFIS2014. 2014, 第 1 作者[45] 陈小军. 基于概率攻击图的内部攻击意图推断算法研. 计算机学报. 2014, 第 1 作者[46] 陈小军, 方滨兴, 谭庆丰, 张浩亮. 基于概率攻击图的内部攻击意图推断算法研究. 计算机学报[J]. 2014, 第 1 作者37(1): 62-72, http://lib.cqvip.com/Qikan/Article/Detail?id=48544434.[47] Chen Xiaojun, Xu Fei, Xu Rui, Yiu S M, Shi Jinqiao, IEEE. A Practical Real-Time Authentication System with Identity Tracking Based on Mouse Dynamics. 2014 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS). 2014, 第 1 作者121-+, [48] 陈小军. 面向内部威胁的最优安全防护策略算法研究. 计算机研究与发展. 2014, 第 1 作者[49] 陈小军, 时金桥, 徐菲, 蒲以国, 郭莉. 面向内部威胁的最优安全策略算法研究. 计算机研究与发展[J]. 2014, 第 1 作者51(7): 1565-1577, http://lib.cqvip.com/Qikan/Article/Detail?id=50300277.[50] Wei, Yichen, Fei, Xu, Chen, Xiaojun, Shi, Jinqiao, Qing, Sihan, Han, W, Huang, Z, Hu, C, Zhang, H, Guo, L. Winnowing Multihashing Structure with Wildcard Query. WEB TECHNOLOGIES AND APPLICATIONS, APWEB 2014, PT II. 2014, 第 3 作者8710: 265-281, [51] 陈小军. An Intent-Driven Masquerader Detection Framework Based on Data Fusion. ISCTCS. 2013, 第 1 作者[52] 张华玲, 陈小军. 网络数据流内容安全检测算法优化与实现. 信息网络安全[J]. 2013, 第 2 作者173-177, http://lib.cqvip.com/Qikan/Article/Detail?id=47650572.[53] Chen Xiaojun, Wei Zicheng, Pu Yiguo, Shi Jinqiao. A Continuous Re-Authentication Approach Using Ensemble Learning. FIRST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND QUANTITATIVE MANAGEMENT. 2013, 第 1 作者17: 870-878, http://dx.doi.org/10.1016/j.procs.2013.05.111.[54] Cheng Qi, Xiaojun Chen, Cui Xu, Jinqiao Shi, Peipeng Liu. A Bigram Based Real Time DNS Tunnel Detection Approach. FIRST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND QUANTITATIVE MANAGEMENT. 2013, 第 2 作者17: 852-860, http://dx.doi.org/10.1016/j.procs.2013.05.109.[55] Yiguo Pu, Xiaojun Chen, Xu Cui, Jinqiao Shi, Li Guo, Cheng Qi. Data Stolen Trojan Detection Based on Network Behaviors. FIRST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND QUANTITATIVE MANAGEMENT. 2013, 第 2 作者17: 828-835, http://dx.doi.org/10.1016/j.procs.2013.05.106.[56] 刘祥涛, 程学旗, 李洋, 陈小军, 白硕, 刘悦. eMule网络最佳节点标识. 软件学报[J]. 2011, 第 4 作者22(9): 2121-2136, http://lib.cqvip.com/Qikan/Article/Detail?id=39062405.[57] Zhang Zhibin, Guo Li, Fang Binxing, Chen Xiaojun, IEEE. Parallelizing protocol processing on SMT processor efficiently: A FSM decomposition approach. 2007 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2. 2007, 第 4 作者348-+, [58] 陈小军. 基于模拟平台的网络安全程序性能研究. 2007, 第 1 作者[59] 陈小军, 张志斌, 刘燕兵, 郭莉. 大规模多串匹配算法的访存行为分析. 计算机工程与应用[J]. 2007, 第 1 作者43(26): 106-109, http://lib.cqvip.com/Qikan/Article/Detail?id=25368454.[60] 张志斌, 郭莉, 陈小军, 方滨兴. 一种基于自动机分解的网络协议并行处理策略. 计算机学报[J]. 2006, 第 3 作者29(8): 1496-1504, http://lib.cqvip.com/Qikan/Article/Detail?id=22602177.