Towards time-aware knowledge graph completion T Jiang, T Liu, T Ge, L Sha, B Chang, S Li, Z Sui Proceedings of COLING 2016, the 26th International Conference on …, 2016 | 165 | 2016 |
Encoding temporal information for time-aware link prediction T Jiang, T Liu, T Ge, L Sha, S Li, B Chang, Z Sui Proceedings of the 2016 conference on empirical methods in natural language …, 2016 | 127 | 2016 |
Fca: Learning a 3d full-coverage vehicle camouflage for multi-view physical adversarial attack D Wang, T Jiang, J Sun, W Zhou, Z Gong, X Zhang, W Yao, X Chen Proceedings of the AAAI conference on artificial intelligence 36 (2), 2414-2422, 2022 | 68 | 2022 |
Chinese semantic role labeling with bidirectional recurrent neural networks Z Wang, T Jiang, B Chang, Z Sui Proceedings of the 2015 Conference on Empirical Methods in Natural Language …, 2015 | 54 | 2015 |
An approximated gradient sign method using differential evolution for black-box adversarial attack C Li, H Wang, J Zhang, W Yao, T Jiang IEEE Transactions on Evolutionary Computation 26 (5), 976-990, 2022 | 37 | 2022 |
Ersom: A structural ontology matching approach using automatically learned entity representation C Xiang, T Jiang, B Chang, Z Sui Proceedings of the 2015 conference on empirical methods in natural language …, 2015 | 36 | 2015 |
A survey on physical adversarial attack in computer vision D Wang, W Yao, T Jiang, G Tang, X Chen arXiv preprint arXiv:2209.14262, 2022 | 25 | 2022 |
Adaptive momentum variance for attention-guided sparse adversarial attacks C Li, W Yao, H Wang, T Jiang Pattern Recognition 133, 108979, 2023 | 23 | 2023 |
Bayesian evolutionary optimization for crafting high-quality adversarial examples with limited query budget C Li, W Yao, H Wang, T Jiang, X Zhang Applied Soft Computing 142, 110370, 2023 | 15 | 2023 |
Rfla: A stealthy reflected light adversarial attack in the physical world D Wang, W Yao, T Jiang, C Li, X Chen Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023 | 14 | 2023 |
Evolutionary game based access class barring for machine-to-machine communications T Jiang, X Tan, X Luan, X Zhang, J Wu 16th International Conference on Advanced Communication Technology, 832-835, 2014 | 14 | 2014 |
Capturing argument relationship for Chinese semantic role labeling L Sha, S Li, B Chang, Z Sui, T Jiang Proceedings of the 2016 Conference on Empirical Methods in Natural Language …, 2016 | 13 | 2016 |
Adversarial patch attacks against aerial imagery object detectors G Tang, T Jiang, W Zhou, C Li, W Yao, Y Zhao Neurocomputing 537, 128-140, 2023 | 12 | 2023 |
Recognizing textual entailment using probabilistic inference L Sha, S Li, B Chang, Z Sui, T Jiang Proceedings of the 2015 Conference on Empirical Methods in Natural Language …, 2015 | 11 | 2015 |
Differential evolution based dual adversarial camouflage: Fooling human eyes and object detectors J Sun, W Yao, T Jiang, D Wang, X Chen Neural Networks 163, 256-271, 2023 | 10 | 2023 |
Revisiting distant supervision for relation extraction T Jiang, J Liu, CY Lin, Z Sui Proceedings of the Eleventh International Conference on Language Resources …, 2018 | 10 | 2018 |
HatchEnsemble: an efficient and practical uncertainty quantification method for deep neural networks Y Xia, J Zhang, T Jiang, Z Gong, W Yao, L Feng Complex & Intelligent Systems 7 (6), 2855-2869, 2021 | 7 | 2021 |
Adversarial infrared blocks: A multi-view black-box attack to thermal infrared detectors in physical world C Hu, W Shi, T Jiang, W Yao, L Tian, X Chen, J Zhou, W Li Neural Networks 175, 106310, 2024 | 6 | 2024 |
Natural weather-style black-box adversarial attacks against optical aerial detectors G Tang, W Yao, T Jiang, W Zhou, Y Yang, D Wang IEEE Transactions on Geoscience and Remote Sensing, 2023 | 5 | 2023 |
Improving transferability of universal adversarial perturbation with feature disruption D Wang, W Yao, T Jiang, X Chen IEEE Transactions on Image Processing, 2023 | 4 | 2023 |