Yixiao Xu

Orcid: 0009-0007-0242-3372

According to our database1, Yixiao Xu authored at least 16 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Neural Honeytrace: A Robust Plug-and-Play Watermarking Framework against Model Extraction Attacks.
CoRR, January, 2025

Query-Efficient Model Inversion Attacks: An Information Flow View.
IEEE Trans. Inf. Forensics Secur., 2025

Effectively Virtual Page Prefetching via Spatial-Temporal Patterns for Memory-intensive Cloud Applications.
Proceedings of the 30th ACM SIGPLAN Annual Symposium on Principles and Practice of Parallel Programming, 2025

gFlow: Distributed Real-Time Reverse Remote Rendering System Model.
Proceedings of the MultiMedia Modeling, 2025

2024
LT-Defense: Searching-free Backdoor Defense via Exploiting the Long-tailed Effect.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024

Watch Your Words: Successfully Jailbreak LLM by Mitigating the "Prompt Malice".
Proceedings of the Web and Big Data - 8th International Joint Conference, 2024

2023
Efficient intrusion detection toward IoT networks using cloud-edge collaboration.
Comput. Networks, June, 2023

Optimum: Runtime optimization for multiple mixed model deployment deep learning inference.
J. Syst. Archit., 2023

Remaining Useful Life Prediction With Partial Sensor Malfunctions Using Deep Adversarial Networks.
IEEE CAA J. Autom. Sinica, 2023

Launching a Robust Backdoor Attack under Capability Constrained Scenarios.
CoRR, 2023

Dissecting Scale-Out Applications Performance on Diverse TLB Designs (S).
Proceedings of the 35th International Conference on Software Engineering and Knowledge Engineering, 2023

Sparse Black-Box Inversion Attack with Limited Information.
Proceedings of the IEEE International Conference on Acoustics, 2023

2022
An Automated Multi-Tab Website Fingerprinting Attack.
IEEE Trans. Dependable Secur. Comput., 2022

IBD: An Interpretable Backdoor-Detection Method via Multivariate Interactions.
Sensors, 2022

Sparse Adversarial Attack For Video Via Gradient-Based Keyframe Selection.
Proceedings of the IEEE International Conference on Acoustics, 2022

2018
A Multi-tab Website Fingerprinting Attack.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018


  Loading...