Xiaoyu Zhang

Orcid: 0000-0002-5702-5749

Affiliations:
  • Xidian University, State Key Laboratory of Integrated Service Networks, Xi'an, China (PhD 2019)


According to our database1, Xiaoyu Zhang authored at least 42 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Mitigating Data Scarcity in Time Series Analysis: A Foundation Model with Series-Symbol Data Generation.
CoRR, February, 2025

DeepAW: A Customized DNN Watermarking Scheme Against Unreliable Participants.
IEEE Trans. Netw. Sci. Eng., 2025

Purifier$^{+}$: Plug-and-Play Backdoor Mitigation for Pre-Trained Models via Activation Alignment.
IEEE Trans. Multim., 2025

DuplexGuard: Safeguarding Deletion Right in Machine Unlearning via Duplex Watermarking.
IEEE Trans. Dependable Secur. Comput., 2025

MPGStack: Membership Privacy Protection on Graph Data via Model Stacking.
IEEE Trans. Dependable Secur. Comput., 2025

TSGGuide: Recommendation Guide for Multivariate Time Series Generation.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2025, 2025

Zeroth-Order Federated Private Tuning for Pretrained Large Language Models.
Proceedings of the Information Security and Privacy - 30th Australasian Conference, 2025

B2Opt: Learning to Optimize Black-box Optimization with Little Budget.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025

2024
MODA: Model Ownership Deprivation Attack in Asynchronous Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2024

MaskArmor: Confidence masking-based defense mechanism for GNN against MIA.
Inf. Sci., 2024

GLHF: General Learned Evolutionary Algorithm Via Hyper Functions.
CoRR, 2024

Rapid Plug-in Defenders.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024

Pretrained Optimization Model for Zero-Shot Black Box Optimization.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024

Balancing Generalization and Robustness in Adversarial Training via Steering through Clean and Adversarial Gradient Directions.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

GDR-GMA: Machine Unlearning via Direction-Rectified and Magnitude-Adjusted Gradients.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Automated Loss function Search for Class-imbalanced Node Classification.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

2023
A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network.
Comput. Stand. Interfaces, 2023

Pre-trained transformer for adversarial purification.
CoRR, 2023

B2Opt: Learning to Optimize Black-box Optimization with Little Budget.
CoRR, 2023

ACQ: Few-shot Backdoor Defense via Activation Clipping and Quantizing.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

MUter: Machine Unlearning on Adversarially Trained Models.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Explaining Adversarial Robustness of Neural Networks from Clustering Effect Perspective.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

ERM-KTP: Knowledge-Level Machine Unlearning via Knowledge Transfer.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Closed-form Machine Unlearning for Matrix Factorization.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

2022
Chameleon DNN Watermarking: Dynamically Public Model Ownership Verification.
Proceedings of the Information Security Applications - 23rd International Conference, 2022

Purifier: Plug-and-play Backdoor Mitigation for Pre-trained Models Via Anomaly Activation Suppression.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

GAME: Generative-Based Adaptive Model Extraction Attack.
Proceedings of the Computer Security - ESORICS 2022, 2022

Membership Inference Attacks Against Robust Graph Neural Network.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

2021
Privacy-preserving and verifiable online crowdsourcing with worker updates.
Inf. Sci., 2021

Privacy Inference Attacks and Defenses in Cloud-based Deep Neural Network: A Survey.
CoRR, 2021

CECMLP: New Cipher-Based Evaluating Collaborative Multi-layer Perceptron Scheme in Federated Learning.
Proceedings of the Applied Cryptography and Network Security, 2021

2020
DeepPAR and DeepDPA: Privacy Preserving and Asynchronous Deep Learning for Industrial IoT.
IEEE Trans. Ind. Informatics, 2020

Secure multiparty learning from the aggregation of locally trained models.
J. Netw. Comput. Appl., 2020

A High-Recall Membership Inference Attack Based on Confidence-Thresholding Method with Relaxed Assumption.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

2019
New publicly verifiable computation for batch matrix multiplication.
Inf. Sci., 2019

Non-interactive privacy-preserving neural network prediction.
Inf. Sci., 2019

Secure Multiparty Learning from Aggregation of Locally Trained Models.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

2018
Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing.
Soft Comput., 2018

EPSLP: Efficient and privacy-preserving single-layer perceptron learning in cloud computing.
J. High Speed Networks, 2018

DedupDUM: Secure and scalable data deduplication with dynamic user management.
Inf. Sci., 2018

2017
Security Analysis of "PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-Healthcare".
IACR Cryptol. ePrint Arch., 2017

New Publicly Verifiable Computation for Batch Matrix Multiplication.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017


  Loading...