Folgen
Yixiao Xu
Titel
Zitiert von
Zitiert von
Jahr
Efficient intrusion detection toward IoT networks using cloud–edge collaboration
R Yang, H He, Y Xu, B Xin, Y Wang, Y Qu, W Zhang
Computer Networks 228, 109724, 2023
382023
Sparse adversarial attack for video via gradient-based keyframe selection
Y Xu, X Liu, M Yin, T Hu, K Ding
ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and …, 2022
112022
Sparse black-box inversion attack with limited information
Y Xu, X Liu, T Hu, B Xin, R Yang
ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and …, 2023
92023
IBD: An Interpretable Backdoor-Detection Method via Multivariate Interactions
Y Xu, X Liu, K Ding, B Xin
Sensors 22 (22), 8697, 2022
32022
Query-Efficient Model Inversion Attacks: An Information Flow View
Y Xu, B Fang, M Li, X Liu, Z Tian
IEEE Transactions on Information Forensics and Security, 2024
12024
LT-Defense: Searching-free Backdoor Defense via Exploiting the Long-tailed Effect
Y Xu, B Fang, M Li, K Tang, Z Tian
NeurIPS 2024, 2024
12024
Neural Honeytrace: A Robust Plug-and-Play Watermarking Framework against Model Extraction Attacks
Y Xu, B Fang, R Wang, Y Zhou, S Ji, Y Liu, M Li, Z Tian
arXiv preprint arXiv:2501.09328, 2025
2025
Watch Your Words: Successfully Jailbreak LLM by Mitigating the “Prompt Malice”
X Xu, Y Xu, X Chen, P Chen, M Li, Y Sun
Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint …, 2024
2024
RSBA: Robust Statistical Backdoor Attack under Privilege-Constrained Scenarios
X Liu, M Yi, K Ding, B Xin, Y Xu, L Yan, C Shen
arXiv preprint arXiv:2304.10985, 2023
2023
A Robust Adversarial Example Attack Based on Video Augmentation
M Yin, Y Xu, T Hu, X Liu
Applied Sciences 13 (3), 1914, 2023
2023
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–10