Xiaoyong Yuan

Orcid: 0000-0003-0782-4187

According to our database1, Xiaoyong Yuan authored at least 58 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Cascade Vertical Federated Learning Towards Straggler Mitigation and Label Privacy Over Distributed Labels.
IEEE Trans. Big Data, December, 2024

Improving Channel Resilience for Task-Oriented Semantic Communications: A Unified Information Bottleneck Approach.
IEEE Commun. Lett., November, 2024

A Holistic Framework Towards Vision-based Traffic Signal Control with Microscopic Simulation.
CoRR, 2024

PATROL: Privacy-Oriented Pruning for Collaborative Inference Against Model Inversion Attacks.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2024

Individual Fairness with Group Awareness Under Uncertainty.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Research Track, 2024

Enhancing Adaptive Deep Brain Stimulation via Efficient Reinforcement Learning.
Proceedings of the IEEE Intelligent Mobile Computing, 2024

BadFusion: 2D-Oriented Backdoor Attacks against 3D Object Detection.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

2023
Enhancing Winter Road Maintenance via Cloud Computing.
IEEE Internet Comput., 2023

Fed-CPrompt: Contrastive Prompt for Rehearsal-Free Federated Continual Learning.
CoRR, 2023

Embracing Semi-supervised Domain Adaptation for Federated Knowledge Transfer.
Proceedings of the Security and Privacy in Cyber-Physical Systems and Smart Vehicles, 2023

RAMRL: Towards Robust On-Ramp Merging via Augmented Multimodal Reinforcement Learning.
Proceedings of the IEEE International Conference on Mobility, 2023

Learning, Tiny and Huge: Heterogeneous Model Augmentation Towards Federated Tiny Learning.
Proceedings of the International Conference on Machine Learning and Applications, 2023

Distributed Pruning Towards Tiny Neural Networks in Federated Learning.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

Prompt-Based Transceiver Cooperation for Semantic Communications with Domain-Incremental Background Knowledge.
Proceedings of the IEEE Global Communications Conference, 2023

TRGE: A Backdoor Detection After Quantization.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
Learning Fast and Slow: Propedeutica for Real-Time Malware Detection.
IEEE Trans. Neural Networks Learn. Syst., 2022

ES Attack: Model Stealing Against Deep Neural Networks Without Data Hurdles.
IEEE Trans. Emerg. Top. Comput. Intell., 2022

A Praise for Defensive Programming: Leveraging Uncertainty for Effective Malware Mitigation.
IEEE Trans. Dependable Secur. Comput., 2022

Stackelberg equilibrium strategies and coordination of a low-carbon supply chain with a risk-averse retailer.
Int. Trans. Oper. Res., 2022

Beyond Class-Level Privacy Leakage: Breaking Record-Level Privacy in Federated Learning.
IEEE Internet Things J., 2022

Trade credit insurance: insuring strategy of the retailer and the manufacturer.
Int. J. Prod. Res., 2022

FedTiny: Pruned Federated Learning Towards Specialized Tiny Models.
CoRR, 2022

Towards Robust On-Ramp Merging via Augmented Multimodal Reinforcement Learning.
CoRR, 2022

Federated Semi-Supervised Domain Adaptation via Knowledge Transfer.
CoRR, 2022

Membership Inference Attacks and Defenses in Neural Network Pruning.
Proceedings of the 31st USENIX Security Symposium, 2022

Poster: Reliable On-Ramp Merging via Multimodal Reinforcement Learning.
Proceedings of the 7th IEEE/ACM Symposium on Edge Computing, 2022

Pay "Attention" to Adverse Weather: Weather-aware Attention-based Object Detection.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

Cascade Vertical Federated Learning.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

FedZKT: Zero-Shot Knowledge Transfer towards Resource-Constrained Federated Learning with Heterogeneous On-Device Models.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Shapley Explainer - An Interpretation Method for GNNs Used in SDN.
Proceedings of the IEEE Global Communications Conference, 2022

2021
FedZKT: Zero-Shot Knowledge Transfer towards Heterogeneous On-Device Models in Federated Learning.
CoRR, 2021

A Vertical Federated Learning Framework for Horizontally Partitioned Labels.
CoRR, 2021

Towards Stealing Deep Neural Networks on Mobile Devices.
Proceedings of the Security and Privacy in Communication Networks, 2021

Sensing to Learn: Deep Learning Based Wireless Sensing via Connected Digital and Physical Experiments.
Proceedings of the Advances in Simulation and Digital Human Modeling, 2021

2020
Option contract strategies with risk-aversion and emergency purchase.
Int. Trans. Oper. Res., 2020

Trade credit insurance in a capital-constrained supply chain.
Int. Trans. Oper. Res., 2020

Connecting Web Event Forecasting with Anomaly Detection: A Case Study on Enterprise Web Applications Using Self-supervised Neural Networks.
Proceedings of the Security and Privacy in Communication Networks, 2020

Adaptive Adversarial Attack on Scene Text Recognition.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
Adversarial Examples: Attacks and Defenses for Deep Learning.
IEEE Trans. Neural Networks Learn. Syst., 2019

Generalized Batch Normalization: Towards Accelerating Deep Neural Networks.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Analysis of Frequently Failing Tasks and Rescheduling Strategy in the Cloud System.
Int. J. Distributed Syst. Technol., 2018

Detection and defense of DDoS attack-based on deep learning in OpenFlow-based SDN.
Int. J. Commun. Syst., 2018

Adaptive Adversarial Attack on Scene Text Recognition.
CoRR, 2018

Leveraging Uncertainty for Effective Malware Mitigation.
CoRR, 2018

Joint Operational and Financial Collaboration in a Capital-Constrained Supply Chain Under Manufacturer Collateral.
Asia Pac. J. Oper. Res., 2018

2017
基于时间序列分析的杀手级任务在线识别方法 (Time Series Based Killer Task Online Recognition Approach).
计算机科学, 2017

Adversarial Examples: Attacks and Defenses for Deep Learning.
CoRR, 2017

DeepDefense: Identifying DDoS Attack via Deep Learning.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

PhD Forum: Deep Learning-Based Real-Time Malware Detection with Multi-Stage Analysis.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

The dose makes the poison - Leveraging uncertainty for effective malware detection.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

Intelligent Perioperative System: Towards Real-Time Big Data Analytics in Surgery Risk Assessment.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

2016
Time Series Based Killer Task Online Recognition Service: A Google Cluster Case Study.
Proceedings of the 2016 IEEE Symposium on Service-Oriented System Engineering, 2016

DeepSky: Identifying Absorption Bumps via Deep Learning.
Proceedings of the 2016 IEEE International Congress on Big Data, San Francisco, CA, USA, June 27, 2016

2015
Characterizing and Predicting Bug Assignment in OpenStack.
Proceedings of the 2015 Second International Conference on Trustworthy Systems and Their Applications, 2015

An Analysis on Availability Commitment and Penalty in Cloud SLA.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

A Competitive Penalty Model for Availability Based Cloud SLA.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Scheduling Cloud Platform Managed Live-Migration Operations to Minimize the Makespan.
Proceedings of the Network and Parallel Computing, 2014

Dependability Analysis on Open Stack IaaS Cloud: Bug Anaysis and Fault Injection.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014


  Loading...