Xiaoyong Yuan

Orcid: 0000-0003-0782-4187

According to our database1, Xiaoyong Yuan authored at least 53 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Holistic Framework Towards Vision-based Traffic Signal Control with Microscopic Simulation.
CoRR, 2024

PATROL: Privacy-Oriented Pruning for Collaborative Inference Against Model Inversion Attacks.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2024

2023
Enhancing Winter Road Maintenance via Cloud Computing.
IEEE Internet Comput., 2023

Fed-CPrompt: Contrastive Prompt for Rehearsal-Free Federated Continual Learning.
CoRR, 2023

RAMRL: Towards Robust On-Ramp Merging via Augmented Multimodal Reinforcement Learning.
Proceedings of the IEEE International Conference on Mobility, 2023

Learning, Tiny and Huge: Heterogeneous Model Augmentation Towards Federated Tiny Learning.
Proceedings of the International Conference on Machine Learning and Applications, 2023

Distributed Pruning Towards Tiny Neural Networks in Federated Learning.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

Prompt-Based Transceiver Cooperation for Semantic Communications with Domain-Incremental Background Knowledge.
Proceedings of the IEEE Global Communications Conference, 2023

TRGE: A Backdoor Detection After Quantization.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
Learning Fast and Slow: Propedeutica for Real-Time Malware Detection.
IEEE Trans. Neural Networks Learn. Syst., 2022

ES Attack: Model Stealing Against Deep Neural Networks Without Data Hurdles.
IEEE Trans. Emerg. Top. Comput. Intell., 2022

A Praise for Defensive Programming: Leveraging Uncertainty for Effective Malware Mitigation.
IEEE Trans. Dependable Secur. Comput., 2022

Stackelberg equilibrium strategies and coordination of a low-carbon supply chain with a risk-averse retailer.
Int. Trans. Oper. Res., 2022

Beyond Class-Level Privacy Leakage: Breaking Record-Level Privacy in Federated Learning.
IEEE Internet Things J., 2022

Trade credit insurance: insuring strategy of the retailer and the manufacturer.
Int. J. Prod. Res., 2022

FedTiny: Pruned Federated Learning Towards Specialized Tiny Models.
CoRR, 2022

Towards Robust On-Ramp Merging via Augmented Multimodal Reinforcement Learning.
CoRR, 2022

Federated Semi-Supervised Domain Adaptation via Knowledge Transfer.
CoRR, 2022

Membership Inference Attacks and Defenses in Neural Network Pruning.
Proceedings of the 31st USENIX Security Symposium, 2022

Poster: Reliable On-Ramp Merging via Multimodal Reinforcement Learning.
Proceedings of the 7th IEEE/ACM Symposium on Edge Computing, 2022

Pay "Attention" to Adverse Weather: Weather-aware Attention-based Object Detection.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

Cascade Vertical Federated Learning.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

FedZKT: Zero-Shot Knowledge Transfer towards Resource-Constrained Federated Learning with Heterogeneous On-Device Models.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Shapley Explainer - An Interpretation Method for GNNs Used in SDN.
Proceedings of the IEEE Global Communications Conference, 2022

2021
FedZKT: Zero-Shot Knowledge Transfer towards Heterogeneous On-Device Models in Federated Learning.
CoRR, 2021

A Vertical Federated Learning Framework for Horizontally Partitioned Labels.
CoRR, 2021

Towards Stealing Deep Neural Networks on Mobile Devices.
Proceedings of the Security and Privacy in Communication Networks, 2021

Sensing to Learn: Deep Learning Based Wireless Sensing via Connected Digital and Physical Experiments.
Proceedings of the Advances in Simulation and Digital Human Modeling, 2021

2020
Option contract strategies with risk-aversion and emergency purchase.
Int. Trans. Oper. Res., 2020

Trade credit insurance in a capital-constrained supply chain.
Int. Trans. Oper. Res., 2020

ES Attack: Model Stealing against Deep Neural Networks without Data Hurdles.
CoRR, 2020

Connecting Web Event Forecasting with Anomaly Detection: A Case Study on Enterprise Web Applications Using Self-supervised Neural Networks.
Proceedings of the Security and Privacy in Communication Networks, 2020

Adaptive Adversarial Attack on Scene Text Recognition.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
Adversarial Examples: Attacks and Defenses for Deep Learning.
IEEE Trans. Neural Networks Learn. Syst., 2019

Generalized Batch Normalization: Towards Accelerating Deep Neural Networks.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Analysis of Frequently Failing Tasks and Rescheduling Strategy in the Cloud System.
Int. J. Distributed Syst. Technol., 2018

Detection and defense of DDoS attack-based on deep learning in OpenFlow-based SDN.
Int. J. Commun. Syst., 2018

Adaptive Adversarial Attack on Scene Text Recognition.
CoRR, 2018

Leveraging Uncertainty for Effective Malware Mitigation.
CoRR, 2018

Joint Operational and Financial Collaboration in a Capital-Constrained Supply Chain Under Manufacturer Collateral.
Asia Pac. J. Oper. Res., 2018

2017
基于时间序列分析的杀手级任务在线识别方法 (Time Series Based Killer Task Online Recognition Approach).
计算机科学, 2017

Adversarial Examples: Attacks and Defenses for Deep Learning.
CoRR, 2017

DeepDefense: Identifying DDoS Attack via Deep Learning.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

PhD Forum: Deep Learning-Based Real-Time Malware Detection with Multi-Stage Analysis.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

The dose makes the poison - Leveraging uncertainty for effective malware detection.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

Intelligent Perioperative System: Towards Real-Time Big Data Analytics in Surgery Risk Assessment.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

2016
Time Series Based Killer Task Online Recognition Service: A Google Cluster Case Study.
Proceedings of the 2016 IEEE Symposium on Service-Oriented System Engineering, 2016

DeepSky: Identifying Absorption Bumps via Deep Learning.
Proceedings of the 2016 IEEE International Congress on Big Data, San Francisco, CA, USA, June 27, 2016

2015
Characterizing and Predicting Bug Assignment in OpenStack.
Proceedings of the 2015 Second International Conference on Trustworthy Systems and Their Applications, 2015

An Analysis on Availability Commitment and Penalty in Cloud SLA.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

A Competitive Penalty Model for Availability Based Cloud SLA.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Scheduling Cloud Platform Managed Live-Migration Operations to Minimize the Makespan.
Proceedings of the Network and Parallel Computing, 2014

Dependability Analysis on Open Stack IaaS Cloud: Bug Anaysis and Fault Injection.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014


  Loading...