Xiaoyuan Liu

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
Adaptive unified defense framework for tackling adversarial audio attacks.
Artif. Intell. Rev., August, 2024

A Novel Weld Defect Detection Method for Intelligent Magnetic Flux Leakage Detection System via Contextual Relation Network.
IEEE Trans. Ind. Electron., June, 2024

DGICR-Net: Dual-Graph Interactive Consistency Reasoning Network for Weld Defect Recognition With Limited Labeled Samples.
IEEE Trans. Instrum. Meas., 2024

Spectral deferred correction method for fractional initial value problem with Caputo-Hadamard derivative.
Math. Comput. Simul., 2024

HADES: Range-Filtered Private Aggregation on Public Data.
IACR Cryptol. ePrint Arch., 2024

Insight Over Sight? Exploring the Vision-Knowledge Conflicts in Multimodal LLMs.
CoRR, 2024

Improving Scene Graph Generation with Relation Words' Debiasing in Vision-Language Models.
CoRR, 2024

Quantum Computing: Vision and Challenges.
CoRR, 2024

Multi-Armed Bandit-Based Secure Routing in Air-Ground Integrated Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024

DP-RAE: A Dual-Phase Merging Reversible Adversarial Example for Image Privacy Protection.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

<i>ThreatKG: </i> An AI-Powered System for Automated Open-Source Cyber Threat Intelligence Gathering and Management.
Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis, 2024

Effective and Efficient Federated Tree Learning on Hybrid Data.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

Predicate Debiasing in Vision-Language Models Integration for Scene Graph Generation Enhancement.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024

2023
Lessons Learned: Surveying the Practicality of Differential Privacy in the Industry.
Proc. Priv. Enhancing Technol., April, 2023

Basic-Class and Cross-Class Hybrid Feature Learning for Class-Imbalanced Weld Defect Recognition.
IEEE Trans. Ind. Informatics, 2023

Ratel: MPC-extensions for Smart Contracts.
IACR Cryptol. ePrint Arch., 2023

Model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks.
CoRR, 2023

2022
A Defect Recognition Method for Low-Quality Weld Image Based on Consistent Multiscale Feature Mapping.
IEEE Trans. Instrum. Meas., 2022

ThreatKG: A Threat Knowledge Graph for Automated Open-Source Cyber Threat Intelligence Gathering and Management.
CoRR, 2022

UniFed: A Benchmark for Federated Learning Frameworks.
CoRR, 2022

Meta-Lens in the Sky.
IEEE Access, 2022

Your Voice is Not Yours? Black-Box Adversarial Attacks Against Speaker Recognition Systems.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

Sentence-aware Adversarial Meta-Learning for Few-Shot Text Classification.
Proceedings of the 29th International Conference on Computational Linguistics, 2022

2021
Estimating Homogeneous Reference Frame for Absolute Electrical Impedance Tomography Through Measurements and Scale Feature.
IEEE Trans. Instrum. Meas., 2021

Unsupervised Evaluation and Optimization for Electrical Impedance Tomography.
IEEE Trans. Instrum. Meas., 2021

The Influence of Information Diffusion on Interbank Risk Contagion.
Complex., 2021

A System for Automated Open-Source Threat Intelligence Gathering and Management.
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021

Disease and Death Monitoring on Amazon Managed Streaming for Apache Kafka.
Proceedings of the ISAIMS 2021: 2nd International Symposium on Artificial Intelligence for Medicine Sciences, Beijing, China, October 29, 2021

A Fast Approximate Method for the Large-scale One-source P-median Problem.
Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management, 2021

Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

2020
Distributed Structured Actor-Critic Reinforcement Learning for Universal Dialogue Management.
IEEE ACM Trans. Audio Speech Lang. Process., 2020

BeeTrace: A Unified Platform for Secure Contact Tracing that Breaks Data Silos.
IEEE Data Eng. Bull., 2020

Structured Hierarchical Dialogue Policy with Graph Neural Networks.
CoRR, 2020

Pretrained Transformers Improve Out-of-Distribution Robustness.
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020

2019
Robot Programming Language Based on VB Scripting for Robot Motion Control.
Proceedings of the Intelligent Robotics and Applications - 12th International Conference, 2019

3D Printed Chest Models with Realistic Shape and Electrical Property for Electrical Impedance Tomography.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2019

A Method for Absolute Electrical Impedance Tomography without Measuring Reference Voltages.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2019

2018
An Unsupervised Method for Evaluating Electrical Impedance Tomography Images.
IEEE Trans. Instrum. Meas., 2018

2017
基于定向双边全变差正则化的文档图像超分辨率算法研究 (Research of Document Image Super Resolution Algorithm Based on Directional Bilateral Total Variation Regularization).
计算机科学, 2017

2013
On the designing principles and optimization approaches of bio-inspired self-organized network: a survey.
Sci. China Inf. Sci., 2013


  Loading...