Efficient intrusion detection toward IoT networks using cloud–edge collaboration R Yang, H He, Y Xu, B Xin, Y Wang, Y Qu, W Zhang Computer Networks 228, 109724, 2023 | 38 | 2023 |
Sparse adversarial attack for video via gradient-based keyframe selection Y Xu, X Liu, M Yin, T Hu, K Ding ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and …, 2022 | 11 | 2022 |
Sparse black-box inversion attack with limited information Y Xu, X Liu, T Hu, B Xin, R Yang ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and …, 2023 | 9 | 2023 |
IBD: An Interpretable Backdoor-Detection Method via Multivariate Interactions Y Xu, X Liu, K Ding, B Xin Sensors 22 (22), 8697, 2022 | 3 | 2022 |
Query-Efficient Model Inversion Attacks: An Information Flow View Y Xu, B Fang, M Li, X Liu, Z Tian IEEE Transactions on Information Forensics and Security, 2024 | 1 | 2024 |
LT-Defense: Searching-free Backdoor Defense via Exploiting the Long-tailed Effect Y Xu, B Fang, M Li, K Tang, Z Tian NeurIPS 2024, 2024 | 1 | 2024 |
Neural Honeytrace: A Robust Plug-and-Play Watermarking Framework against Model Extraction Attacks Y Xu, B Fang, R Wang, Y Zhou, S Ji, Y Liu, M Li, Z Tian arXiv preprint arXiv:2501.09328, 2025 | | 2025 |
Watch Your Words: Successfully Jailbreak LLM by Mitigating the “Prompt Malice” X Xu, Y Xu, X Chen, P Chen, M Li, Y Sun Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint …, 2024 | | 2024 |
RSBA: Robust Statistical Backdoor Attack under Privilege-Constrained Scenarios X Liu, M Yi, K Ding, B Xin, Y Xu, L Yan, C Shen arXiv preprint arXiv:2304.10985, 2023 | | 2023 |
A Robust Adversarial Example Attack Based on Video Augmentation M Yin, Y Xu, T Hu, X Liu Applied Sciences 13 (3), 1914, 2023 | | 2023 |