default search action
Xiaoyong Yuan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c32]Saket S. Chaturvedi, Lan Zhang, Wenbin Zhang, Pan He, Xiaoyong Yuan:
BadFusion: 2D-Oriented Backdoor Attacks against 3D Object Detection. IJCAI 2024: 349-357 - [c31]Jessica Mehregan, Xiaoyong Yuan, Gaurav Bagwe, Jacob Jackson, Ezedin Mohammed, Lan Zhang, Chunxiu Yu:
Enhancing Adaptive Deep Brain Stimulation via Efficient Reinforcement Learning. MobileCloud 2024: 38-45 - [c30]Zichong Wang, Jocelyn Dzuong, Xiaoyong Yuan, Zhong Chen, Yanzhao Wu, Xin Yao, Wenbin Zhang:
Individual Fairness with Group Awareness Under Uncertainty. ECML/PKDD (5) 2024: 89-106 - [c29]Shiwei Ding, Lan Zhang, Miao Pan, Xiaoyong Yuan:
PATROL: Privacy-Oriented Pruning for Collaborative Inference Against Model Inversion Attacks. WACV 2024: 4704-4713 - [i20]Pan He, Quanyi Li, Xiaoyong Yuan, Bolei Zhou:
A Holistic Framework Towards Vision-based Traffic Signal Control with Microscopic Simulation. CoRR abs/2403.06884 (2024) - [i19]Shuai Lyu, Yao Sun, Linke Guo, Xiaoyong Yuan, Fang Fang, Lan Zhang, Xianbin Wang:
Improving Channel Resilience for Task-Oriented Semantic Communications: A Unified Information Bottleneck Approach. CoRR abs/2405.00135 (2024) - [i18]Saket S. Chaturvedi, Lan Zhang, Wenbin Zhang, Pan He, Xiaoyong Yuan:
BadFusion: 2D-Oriented Backdoor Attacks against 3D Object Detection. CoRR abs/2405.03884 (2024) - 2023
- [j14]Mohammad Hossein Tavakoli Dastjerdi, Zheng Liu, Behnam Azmoon, Xiaoyong Yuan:
Enhancing Winter Road Maintenance via Cloud Computing. IEEE Internet Comput. 27(4): 6-14 (2023) - [c28]Renhua Xie, Xuxin Fang, Bo Ma, Chuanhuang Li, Xiaoyong Yuan:
TRGE: A Backdoor Detection After Quantization. Inscrypt (2) 2023: 394-398 - [c27]Lan Zhang, Madhureeta Das, Yao Sun, Dusit Niyato, Xiaoyong Yuan:
Prompt-Based Transceiver Cooperation for Semantic Communications with Domain-Incremental Background Knowledge. GLOBECOM 2023: 2087-2092 - [c26]Hong Huang, Lan Zhang, Chaoyue Sun, Ruogu Fang, Xiaoyong Yuan, Dapeng Wu:
Distributed Pruning Towards Tiny Neural Networks in Federated Learning. ICDCS 2023: 190-201 - [c25]Madhureeta Das, Gaurav Bagwe, Miao Pan, Xiaoyong Yuan, Lan Zhang:
Learning, Tiny and Huge: Heterogeneous Model Augmentation Towards Federated Tiny Learning. ICMLA 2023: 90-97 - [c24]Gaurav Bagwe, Xiaoyong Yuan, Xianhao Chen, Lan Zhang:
RAMRL: Towards Robust On-Ramp Merging via Augmented Multimodal Reinforcement Learning. MOST 2023: 23-33 - [c23]Madhureeta Das, Zhen Liu, Xianhao Chen, Xiaoyong Yuan, Lan Zhang:
Embracing Semi-supervised Domain Adaptation for Federated Knowledge Transfer. SmartSP 2023: 100-113 - [i17]Gaurav Bagwe, Xiaoyong Yuan, Miao Pan, Lan Zhang:
Fed-CPrompt: Contrastive Prompt for Rehearsal-Free Federated Continual Learning. CoRR abs/2307.04869 (2023) - [i16]Shiwei Ding, Lan Zhang, Miao Pan, Xiaoyong Yuan:
PATROL: Privacy-Oriented Pruning for Collaborative Inference Against Model Inversion Attacks. CoRR abs/2307.10981 (2023) - 2022
- [j13]Hongping Li, Gongbing Bi, Wen Song, Xiaoyong Yuan:
Trade credit insurance: insuring strategy of the retailer and the manufacturer. Int. J. Prod. Res. 60(5): 1478-1499 (2022) - [j12]Xiaoyong Yuan, Xiyao Ma, Lan Zhang, Yuguang Fang, Dapeng Wu:
Beyond Class-Level Privacy Leakage: Breaking Record-Level Privacy in Federated Learning. IEEE Internet Things J. 9(4): 2555-2565 (2022) - [j11]Xiaoyong Yuan, Gongbing Bi, Hongping Li, Baofeng Zhang:
Stackelberg equilibrium strategies and coordination of a low-carbon supply chain with a risk-averse retailer. Int. Trans. Oper. Res. 29(6): 3681-3711 (2022) - [j10]Ruimin Sun, Marcus Botacin, Nikolaos Sapountzis, Xiaoyong Yuan, Matt Bishop, Donald E. Porter, Xiaolin Li, Andre Gregio, Daniela Oliveira:
A Praise for Defensive Programming: Leveraging Uncertainty for Effective Malware Mitigation. IEEE Trans. Dependable Secur. Comput. 19(1): 353-369 (2022) - [j9]Xiaoyong Yuan, Leah Ding, Lan Zhang, Xiaolin Li, Dapeng Oliver Wu:
ES Attack: Model Stealing Against Deep Neural Networks Without Data Hurdles. IEEE Trans. Emerg. Top. Comput. Intell. 6(5): 1258-1270 (2022) - [j8]Ruimin Sun, Xiaoyong Yuan, Pan He, Qile Zhu, Aokun Chen, André Grégio, Daniela Oliveira, Xiaolin Li:
Learning Fast and Slow: Propedeutica for Real-Time Malware Detection. IEEE Trans. Neural Networks Learn. Syst. 33(6): 2518-2529 (2022) - [c22]Chuanhuang Li, Jiali Lou, Shiyuan Liu, Zebin Chen, Xiaoyong Yuan:
Shapley Explainer - An Interpretation Method for GNNs Used in SDN. GLOBECOM 2022: 5534-5540 - [c21]Lan Zhang, Dapeng Wu, Xiaoyong Yuan:
FedZKT: Zero-Shot Knowledge Transfer towards Resource-Constrained Federated Learning with Heterogeneous On-Device Models. ICDCS 2022: 928-938 - [c20]Wensheng Xia, Ying Li, Lan Zhang, Zhonghai Wu, Xiaoyong Yuan:
Cascade Vertical Federated Learning. ICME 2022: 1-6 - [c19]Saket S. Chaturvedi, Lan Zhang, Xiaoyong Yuan:
Pay "Attention" to Adverse Weather: Weather-aware Attention-based Object Detection. ICPR 2022: 4573-4579 - [c18]Gaurav Bagwe, Jian Li, Xiaoheng Deng, Xiaoyong Yuan, Lan Zhang:
Poster: Reliable On-Ramp Merging via Multimodal Reinforcement Learning. SEC 2022: 313-315 - [c17]Xiaoyong Yuan, Lan Zhang:
Membership Inference Attacks and Defenses in Neural Network Pruning. USENIX Security Symposium 2022: 4561-4578 - [i15]Xiaoyong Yuan, Lan Zhang:
Membership Inference Attacks and Defenses in Neural Network Pruning. CoRR abs/2202.03335 (2022) - [i14]Saket S. Chaturvedi, Lan Zhang, Xiaoyong Yuan:
Pay "Attention" to Adverse Weather: Weather-aware Attention-based Object Detection. CoRR abs/2204.10803 (2022) - [i13]Madhureeta Das, Xianhao Chen, Xiaoyong Yuan, Lan Zhang:
Federated Semi-Supervised Domain Adaptation via Knowledge Transfer. CoRR abs/2207.10727 (2022) - [i12]Gaurav Bagwe, Jian Li, Xiaoyong Yuan, Lan Zhang:
Towards Robust On-Ramp Merging via Augmented Multimodal Reinforcement Learning. CoRR abs/2208.07307 (2022) - [i11]Hong Huang, Lan Zhang, Chaoyue Sun, Ruogu Fang, Xiaoyong Yuan, Dapeng Wu:
FedTiny: Pruned Federated Learning Towards Specialized Tiny Models. CoRR abs/2212.01977 (2022) - 2021
- [c16]Lan Zhang, Xianhao Chen, Yawei Pang, Xiaoyong Yuan:
Sensing to Learn: Deep Learning Based Wireless Sensing via Connected Digital and Physical Experiments. AHFE (6) 2021: 255-262 - [c15]Shashank Reddy Danda, Xiaoyong Yuan, Bo Chen:
Towards Stealing Deep Neural Networks on Mobile Devices. SecureComm (2) 2021: 495-508 - [i10]Wensheng Xia, Ying Li, Lan Zhang, Zhonghai Wu, Xiaoyong Yuan:
A Vertical Federated Learning Framework for Horizontally Partitioned Labels. CoRR abs/2106.10056 (2021) - [i9]Lan Zhang, Xiaoyong Yuan:
FedZKT: Zero-Shot Knowledge Transfer towards Heterogeneous On-Device Models in Federated Learning. CoRR abs/2109.03775 (2021) - 2020
- [j7]Hongping Li, Gongbing Bi, Xiaoyong Yuan, Dong Wang:
Trade credit insurance in a capital-constrained supply chain. Int. Trans. Oper. Res. 27(5): 2340-2369 (2020) - [j6]Xiaoyong Yuan, Gongbing Bi, Baofeng Zhang, Yugang Yu:
Option contract strategies with risk-aversion and emergency purchase. Int. Trans. Oper. Res. 27(6): 3079-3103 (2020) - [c14]Xiaoyong Yuan, Pan He, Xiaolin Li, Dapeng Wu:
Adaptive Adversarial Attack on Scene Text Recognition. INFOCOM Workshops 2020: 358-363 - [c13]Xiaoyong Yuan, Lei Ding, Malek Ben Salem, Xiaolin Li, Dapeng Wu:
Connecting Web Event Forecasting with Anomaly Detection: A Case Study on Enterprise Web Applications Using Self-supervised Neural Networks. SecureComm (1) 2020: 481-502 - [i8]Xiaoyong Yuan, Lei Ding, Malek Ben Salem, Xiaolin Li, Dapeng Wu:
Connecting Web Event Forecasting with Anomaly Detection: A Case Study on Enterprise Web Applications Using Self-Supervised Neural Networks. CoRR abs/2008.13707 (2020) - [i7]Xiaoyong Yuan, Lei Ding, Lan Zhang, Xiaolin Li, Dapeng Wu:
ES Attack: Model Stealing against Deep Neural Networks without Data Hurdles. CoRR abs/2009.09560 (2020)
2010 – 2019
- 2019
- [j5]Xiaoyong Yuan, Pan He, Qile Zhu, Xiaolin Li:
Adversarial Examples: Attacks and Defenses for Deep Learning. IEEE Trans. Neural Networks Learn. Syst. 30(9): 2805-2824 (2019) - [c12]Xiaoyong Yuan, Zheng Feng, Matthew Norton, Xiaolin Li:
Generalized Batch Normalization: Towards Accelerating Deep Neural Networks. AAAI 2019: 1682-1689 - 2018
- [j4]Gongbing Bi, Yalei Fei, Xiaoyong Yuan, Dong Wang:
Joint Operational and Financial Collaboration in a Capital-Constrained Supply Chain Under Manufacturer Collateral. Asia Pac. J. Oper. Res. 35(3): 1850010:1-1850010:23 (2018) - [j3]Chuanhuang Li, Yan Wu, Xiaoyong Yuan, Zhengjun Sun, Weiming Wang, Xiaolin Li, Liang Gong:
Detection and defense of DDoS attack-based on deep learning in OpenFlow-based SDN. Int. J. Commun. Syst. 31(5) (2018) - [j2]Hongyan Tang, Ying Li, Tong Jia, Xiaoyong Yuan, Zhonghai Wu:
Analysis of Frequently Failing Tasks and Rescheduling Strategy in the Cloud System. Int. J. Distributed Syst. Technol. 9(1): 16-38 (2018) - [i6]Ruimin Sun, Xiaoyong Yuan, Andrew Lee, Matt Bishop, Donald E. Porter, Xiaolin Li, André Grégio, Daniela Oliveira:
Leveraging Uncertainty for Effective Malware Mitigation. CoRR abs/1802.02503 (2018) - [i5]Xiaoyong Yuan, Pan He, Xiaolin Andy Li:
Adaptive Adversarial Attack on Scene Text Recognition. CoRR abs/1807.03326 (2018) - [i4]Xiaoyong Yuan, Zheng Feng, Matthew Norton, Xiaolin Li:
Generalized Batch Normalization: Towards Accelerating Deep Neural Networks. CoRR abs/1812.03271 (2018) - 2017
- [j1]Hongyan Tang, Ying Li, Tong Jia, Xiaoyong Yuan:
基于时间序列分析的杀手级任务在线识别方法 (Time Series Based Killer Task Online Recognition Approach). 计算机科学 44(4): 43-46 (2017) - [c11]Zheng Feng, Rajendra Rana Bhat, Xiaoyong Yuan, Daniel Freeman, Tezcan Baslanti, Azra Bihorac, Xiaolin Li:
Intelligent Perioperative System: Towards Real-Time Big Data Analytics in Surgery Risk Assessment. DASC/PiCom/DataCom/CyberSciTech 2017: 1254-1259 - [c10]Ruimin Sun, Xiaoyong Yuan, Andrew Lee, Matt Bishop, Donald E. Porter, Xiaolin Li, André Grégio, Daniela Oliveira:
The dose makes the poison - Leveraging uncertainty for effective malware detection. DSC 2017: 123-130 - [c9]Xiaoyong Yuan:
PhD Forum: Deep Learning-Based Real-Time Malware Detection with Multi-Stage Analysis. SMARTCOMP 2017: 1-2 - [c8]Xiaoyong Yuan, Chuanhuang Li, Xiaolin Li:
DeepDefense: Identifying DDoS Attack via Deep Learning. SMARTCOMP 2017: 1-8 - [i3]Zheng Feng, Rajendra Rana Bhat, Xiaoyong Yuan, Daniel Freeman, Tezcan Baslanti, Azra Bihorac, Xiaolin Li:
Intelligent Perioperative System: Towards Real-time Big Data Analytics in Surgery Risk Assessment. CoRR abs/1709.10192 (2017) - [i2]Ruimin Sun, Xiaoyong Yuan, Pan He, Qile Zhu, Aokun Chen, André Grégio, Daniela Oliveira, Xiaolin Li:
Learning Fast and Slow: PROPEDEUTICA for Real-time Malware Detection. CoRR abs/1712.01145 (2017) - [i1]Xiaoyong Yuan, Pan He, Qile Zhu, Rajendra Rana Bhat, Xiaolin Li:
Adversarial Examples: Attacks and Defenses for Deep Learning. CoRR abs/1712.07107 (2017) - 2016
- [c7]Xiaoyong Yuan, Min Li, Sudeep Gaddam, Xiaolin Li, Yinan Zhao, Jingzhe Ma, Jian Ge:
DeepSky: Identifying Absorption Bumps via Deep Learning. BigData Congress 2016: 214-221 - [c6]Hongyan Tang, Ying Li, Tong Jia, Xiaoyong Yuan, Zhonghai Wu:
Time Series Based Killer Task Online Recognition Service: A Google Cluster Case Study. SOSE 2016: 136-145 - 2015
- [c5]Xiaoyong Yuan, Hongyan Tang, Ying Li, Tong Jia, Tiancheng Liu, Zhonghai Wu:
A Competitive Penalty Model for Availability Based Cloud SLA. CLOUD 2015: 964-970 - [c4]Xiaoyong Yuan, Ying Li, Tong Jia, Tiancheng Liu, Zhonghai Wu:
An Analysis on Availability Commitment and Penalty in Cloud SLA. COMPSAC 2015: 914-919 - [c3]Tong Jia, Ying Li, Xiaoyong Yuan, Hongyan Tang, Zhonghai Wu:
Characterizing and Predicting Bug Assignment in OpenStack. TSA 2015: 16-23 - 2014
- [c2]Xiaoyong Yuan, Ying Li, Zhonghai Wu, Tiancheng Liu:
Dependability Analysis on Open Stack IaaS Cloud: Bug Anaysis and Fault Injection. CloudCom 2014: 18-25 - [c1]Xiaoyong Yuan, Ying Li, Yanqi Wang, Kewei Sun:
Scheduling Cloud Platform Managed Live-Migration Operations to Minimize the Makespan. NPC 2014: 595-599
Coauthor Index
aka: Xiaolin Andy Li
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-21 21:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint