Li Chen
Li Chen
Intel; Johns Hopkins University
Verified email at intel.com
Title
Cited by
Cited by
Year
Keeping the bad guys out: Protecting and vaccinating deep learning with jpeg compression
N Das, M Shanbhogue, ST Chen, F Hohman, L Chen, ME Kounavis, ...
arXiv preprint arXiv:1705.02900, 2017
1572017
Shield: Fast, practical defense and vaccination for deep learning using jpeg compression
N Das, M Shanbhogue, ST Chen, F Hohman, S Li, L Chen, ME Kounavis, ...
Proceedings of the 24th ACM SIGKDD International Conference on Knowledgeá…, 2018
1042018
Mapping archaeological landscapes from space
DC Comer, MJ Harrower
Springer Science & Business Media, 2013
982013
Spectral clustering for divide-and-conquer graph matching
V Lyzinski, DL Sussman, DE Fishkind, H Pao, L Chen, JT Vogelstein, ...
Parallel Computing 47, 70-87, 2015
452015
Vertex Nomination Schemes for Membership Prediction
DE Fishkind, V Lyzinski, H Pao, L Chen, CE Priebe
Annuals of Applied Statistics, accepted for publication. arXiv preprintá…, 2015
332015
A joint graph inference case study: the c. elegans chemical and electrical connectomes
L Chen, JT Vogelstein, V Lyzinski, CE Priebe
Worm. http://www.tandfonline.com/doi/full/10.1080/21624054.2016.1142041á…, 2015
292015
Henet: A deep learning approach on intel« processor trace for effective exploit detection
L Chen, S Sultana, R Sahita
2018 IEEE Security and Privacy Workshops (SPW), 109-115, 2018
24*2018
Deep transfer learning for static malware classification
L Chen
arXiv preprint arXiv:1812.07606, 2018
212018
ADAGIO: Interactive Experimentation with Adversarial Attack and Defense for Audio
N Das, M Shanbhogue, ST Chen, L Chen, ME Kounavis, DH Chau
Joint European Conference on Machine Learning and Knowledge Discovery iná…, 2018
142018
Robust Vertex Classification
L Chen, C Shen, J Vogelstein, C Priebe
IEEE Transactions on Pattern Analysis and Machine Intelligence, accepted forá…, 2015
142015
POSTER: Semi-supervised classification for dynamic Android malware detection
L Chen, M Zhang, CY Yang, R Sahita
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communicationsá…, 2017
122017
Vertex nomination: The canonical sampling and the extended spectral nomination schemes
J Yoder, L Chen, H Pao, E Bridgeford, K Levin, DE Fishkind, C Priebe, ...
Computational Statistics & Data Analysis 145, 106916, 2020
112020
Semi-supervised classification for dynamic Android malware detection
L Chen, M Zhang, CY Yang, R Sahita
https://arxiv.org/abs/1704.05948, 2017
112017
Refinement of a method for identifying probable archaeological sites from remotely sensed data
L Chen, DC Comer, CE Priebe, D Sussman, JC Tilton
Mapping archaeological landscapes from space, 251-258, 2013
112013
Sparse Representation Classification Beyond ℓ1 Minimization and the Subspace Assumption
C Shen, L Chen, Y Dong, CE Priebe
IEEE Transactions on Information Theory 66 (8), 5061-5071, 2020
92020
Sequential screening: A Bayesian dynamic programming analysis of optimal group-splitting
PI Frazier, B Jedynak, L Chen
Proceedings of the 2012 Winter Simulation Conference (WSC), 1-12, 2012
92012
Towards resilient machine learning for ransomware detection
L Chen, CY Yang, A Paul, R Sahita
arXiv preprint arXiv:1812.09400, 2018
82018
Enhanced archaeological predictive modelling in space archaeology
L Chen, CE Priebe, DL Sussman, DC Comer, WP Megarry, JC Tilton
arXiv preprint arXiv:1301.2738, 2013
72013
Risk management for nonprofit organizations
L Chen
62010
Compression to the rescue: Defending from adversarial attacks across modalities
N Das, M Shanbhogue, ST Chen, F Hohman, S Li, L Chen, ME Kounavis, ...
ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2018
52018
The system can't perform the operation now. Try again later.
Articles 1–20