Xiaoyu Cao

Orcid: 0000-0003-2775-1026

According to our database1, Xiaoyu Cao authored at least 38 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Multiperceptive Region of Spatial-Temporal Graph Convolutional Shrinkage Network for Arrhythmia Recognition.
IEEE Trans. Instrum. Meas., 2024

Distributionally Robust Frequency-Constrained Microgrid Scheduling Towards Seamless Islanding.
CoRR, 2024

2023
Multistage Dynamic Planning of Integrated Hydrogen-Electrical Microgrids Under Multiscale Uncertainties.
IEEE Trans. Smart Grid, September, 2023

TOPIC: A Parallel Association Paradigm for Multi-Object Tracking under Complex Motions and Diverse Scenes.
CoRR, 2023

FedRecover: Recovering from Poisoning Attacks in Federated Learning using Historical Information.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
Secure Federated Learning: Attacks and Defenses.
PhD thesis, 2022

FLCert: Provably Secure Federated Learning Against Poisoning Attacks.
IEEE Trans. Inf. Forensics Secur., 2022

Hydrogen-Based Networked Microgrids Planning Through Two-Stage Stochastic Programming With Mixed-Integer Conic Recourse.
IEEE Trans Autom. Sci. Eng., 2022

A dataset of ant colonies motion trajectories in indoor and outdoor scenes for social cluster behavior study.
CoRR, 2022

Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data.
Proceedings of the 31st USENIX Security Symposium, 2022

FLDetector: Defending Federated Learning Against Model Poisoning Attacks via Detecting Malicious Clients.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

Almost Tight L0-norm Certified Robustness of Top-k Predictions against Adversarial Perturbations.
Proceedings of the Tenth International Conference on Learning Representations, 2022

MPAF: Model Poisoning Attacks to Federated Learning based on Fake Clients.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2022

Efficient and Accurate Simulation of Origin-Destination Flow in Telecommunication Systems.
Proceedings of the 18th IEEE International Conference on Automation Science and Engineering, 2022

Certified Robustness of Nearest Neighbors against Data Poisoning and Backdoor Attacks.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

iGrow: A Smart Agriculture Solution to Autonomous Greenhouse Control.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
FaceGuard: Proactive Deepfake Detection.
CoRR, 2021

IGrow: A Smart Agriculture Solution to Autonomous Greenhouse Control.
CoRR, 2021

Robust MMSE Beamforming of Downlink Multi-User MISO Systems in the Presence of Beam Pointing Error.
Proceedings of the 13th International Conference on Wireless Communications and Signal Processing, 2021

Data Poisoning Attacks to Local Differential Privacy Protocols.
Proceedings of the 30th USENIX Security Symposium, 2021

FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Certified Robustness of Graph Neural Networks against Adversarial Structural Perturbation.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

Understanding the Security of Deepfake Detection.
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021

IPGuard: Protecting Intellectual Property of Deep Neural Networks via Fingerprinting the Classification Boundary.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Intrinsic Certified Robustness of Bagging against Data Poisoning Attacks.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

Provably Secure Federated Learning against Malicious Clients.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
A Risk-Averse Conic Model for Networked Microgrids Planning With Reconfiguration and Reorganizations.
IEEE Trans. Smart Grid, 2020

Certified Robustness of Nearest Neighbors against Data Poisoning Attacks.
CoRR, 2020

On Certifying Robustness against Backdoor Attacks via Randomized Smoothing.
CoRR, 2020

Certified Robustness of Community Detection against Adversarial Structural Perturbation via Randomized Smoothing.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Local Model Poisoning Attacks to Byzantine-Robust Federated Learning.
Proceedings of the 29th USENIX Security Symposium, 2020

Certified Robustness for Top-k Predictions against Adversarial Perturbations via Randomized Smoothing.
Proceedings of the 8th International Conference on Learning Representations, 2020

2019
Networked Microgrids Planning Through Chance Constrained Stochastic Conic Programming.
IEEE Trans. Smart Grid, 2019

The Semantic Analysis and Representation of "Hai-NP-Ne" Construction with NP Quoted from Context.
Proceedings of the Chinese Lexical Semantics - 20th Workshop, 2019

2018
Distributed Generation Planning Guidance Through Feasibility and Profit Analysis.
IEEE Trans. Smart Grid, 2018

2017
PIANO: Proximity-Based User Authentication on Voice-Powered Internet-of-Things Devices.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2014
Long-Term Maintenance Scheduling of Smart Distribution System through a PSO-TS Algorithm.
J. Appl. Math., 2014


  Loading...