Xiaoyu Zhang

Orcid: 0000-0002-5702-5749

Affiliations:
  • Xidian University, State Key Laboratory of Integrated Service Networks, Xi'an, China (PhD 2019)


According to our database1, Xiaoyu Zhang authored at least 29 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
MODA: Model Ownership Deprivation Attack in Asynchronous Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2024

MaskArmor: Confidence masking-based defense mechanism for GNN against MIA.
Inf. Sci., 2024

Machine Unlearning in Forgettability Sequence.
CoRR, 2024

GLHF: General Learned Evolutionary Algorithm Via Hyper Functions.
CoRR, 2024

Balancing Generalization and Robustness in Adversarial Training via Steering through Clean and Adversarial Gradient Directions.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

GDR-GMA: Machine Unlearning via Direction-Rectified and Magnitude-Adjusted Gradients.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Automated Loss function Search for Class-imbalanced Node Classification.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

2023
A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network.
Comput. Stand. Interfaces, 2023

Pre-trained transformer for adversarial purification.
CoRR, 2023

B2Opt: Learning to Optimize Black-box Optimization with Little Budget.
CoRR, 2023

ACQ: Few-shot Backdoor Defense via Activation Clipping and Quantizing.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

MUter: Machine Unlearning on Adversarially Trained Models.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Explaining Adversarial Robustness of Neural Networks from Clustering Effect Perspective.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

ERM-KTP: Knowledge-Level Machine Unlearning via Knowledge Transfer.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Closed-form Machine Unlearning for Matrix Factorization.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

2022
Chameleon DNN Watermarking: Dynamically Public Model Ownership Verification.
Proceedings of the Information Security Applications - 23rd International Conference, 2022

Purifier: Plug-and-play Backdoor Mitigation for Pre-trained Models Via Anomaly Activation Suppression.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

GAME: Generative-Based Adaptive Model Extraction Attack.
Proceedings of the Computer Security - ESORICS 2022, 2022

Membership Inference Attacks Against Robust Graph Neural Network.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

2021
Privacy-preserving and verifiable online crowdsourcing with worker updates.
Inf. Sci., 2021

Privacy Inference Attacks and Defenses in Cloud-based Deep Neural Network: A Survey.
CoRR, 2021

2020
DeepPAR and DeepDPA: Privacy Preserving and Asynchronous Deep Learning for Industrial IoT.
IEEE Trans. Ind. Informatics, 2020

Secure multiparty learning from the aggregation of locally trained models.
J. Netw. Comput. Appl., 2020

2019
New publicly verifiable computation for batch matrix multiplication.
Inf. Sci., 2019

Non-interactive privacy-preserving neural network prediction.
Inf. Sci., 2019

Secure Multiparty Learning from Aggregation of Locally Trained Models.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

2018
Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing.
Soft Comput., 2018

DedupDUM: Secure and scalable data deduplication with dynamic user management.
Inf. Sci., 2018

2017
New Publicly Verifiable Computation for Batch Matrix Multiplication.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017


  Loading...