Xiyang Liu

Orcid: 0009-0005-0230-3106

According to our database1, Xiyang Liu authored at least 74 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Insufficient Statistics Perturbation: Stable Estimators for Private Least Squares.
CoRR, 2024

Decomposition based cross-parallel multiobjective genetic programming for symbolic regression.
Appl. Soft Comput., 2024

Multimodal Relation Extraction via a Mixture of Hierarchical Visual Context Learners.
Proceedings of the ACM on Web Conference 2024, 2024

FOCT: Few-shot Industrial Anomaly Detection with Foreground-aware Online Conditional Transport.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Insufficient Statistics Perturbation: Stable Estimators for Private Least Squares Extended Abstract.
Proceedings of the Thirty Seventh Annual Conference on Learning Theory, June 30, 2024

2023
Machine Learning-Aided Efficient Decoding of Reed-Muller Subcodes.
IEEE J. Sel. Areas Inf. Theory, 2023

Towards Exascale Computation for Turbomachinery Flows.
CoRR, 2023

Near Optimal Private and Robust Linear Regression.
CoRR, 2023

Toward Exascale Computation for Turbomachinery Flows.
Proceedings of the International Conference for High Performance Computing, 2023

Hierarchical Vector Quantized Transformer for Multi-class Unsupervised Anomaly Detection.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Label Robust and Differentially Private Linear Regression: Computational and Statistical Efficiency.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Batch Verification-Based Anonymous and Traceable Data Sharing Scheme in Industrial Internet of Things.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Prototypes-oriented Transductive Few-shot Learning with Conditional Transport.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
Mace: A flexible framework for membership privacy estimation in generative models.
Trans. Mach. Learn. Res., 2022

Heterogeneous Graph Neural Network with Hypernetworks for Knowledge Graph Embedding.
Proceedings of the Semantic Web - ISWC 2022, 2022

DP-PCA: Statistically Optimal and Differentially Private PCA.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

An Adaptive Population-based Iterative Greedy Algorithm for Optimizing the Maximum Completion Time of Hybrid Flow Shop.
Proceedings of the 2022 The 5th International Conference on Control and Computer Vision, 2022

LightPose: A Lightweight and Efficient Model with Transformer for Human Pose Estimation.
Proceedings of the IEEE International Conference on Acoustics, 2022

Differential privacy and robust statistics in high dimensions.
Proceedings of the Conference on Learning Theory, 2-5 July 2022, London, UK., 2022

2021
Automatic zipper tape defect detection using two-stage multi-scale convolutional networks.
Neurocomputing, 2021

RAGAT: Relation Aware Graph Attention Network for Knowledge Graph Completion.
IEEE Access, 2021

Robust and differentially private mean estimation.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Reed-Muller Subcodes: Machine Learning-Aided Design of Efficient Soft Recursive Decoding.
Proceedings of the IEEE International Symposium on Information Theory, 2021

KO codes: inventing nonlinear encoding and decoding for reliable wireless communication via deep-learning.
Proceedings of the 38th International Conference on Machine Learning, 2021

2020
A Location Privacy-Preserving System Based on Query Range Cover-Up or Location-Based Services.
IEEE Trans. Veh. Technol., 2020

Artificial intelligence manages congenital cataract with individualized prediction and telehealth computing.
npj Digit. Medicine, 2020

A human-in-the-loop deep learning paradigm for synergic visual evaluation in children.
Neural Networks, 2020

MACE: A Flexible Framework for Membership Privacy Estimation in Generative Models.
CoRR, 2020

Adaptive Mixture Regression Network with Local Counting Map for Crowd Counting.
CoRR, 2020

CKAN: Collaborative Knowledge-aware Attentive Network for Recommender Systems.
Proceedings of the 43rd International ACM SIGIR conference on research and development in Information Retrieval, 2020

Adaptive Mixture Regression Network with Local Counting Map for Crowd Counting.
Proceedings of the Computer Vision - ECCV 2020, 2020

2019
Breaking Text-based CAPTCHAs using Average Vertical Partition.
J. Inf. Sci. Eng., 2019

Minimax Rates of Estimating Approximate Differential Privacy.
CoRR, 2019

Minimax Optimal Estimation of Approximate Differential Privacy on Neighboring Databases.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

2017
Research on the Security of Microsoft's Two-Layer Captcha.
IEEE Trans. Inf. Forensics Secur., 2017

2016
Improved CTT-SP Algorithm with Critical Path Method for Massive Data Storage in Scientific Workflow Systems.
Int. J. Pattern Recognit. Artif. Intell., 2016

Robustness of text-based completely automated public turing test to tell computers and humans apart.
IET Inf. Secur., 2016

Multiple Visual Objects Segmentation Based on Adaptive Otsu and Improved DRLSE.
Proceedings of the Intelligent Computing Methodologies - 12th International Conference, 2016

A Hybrid Evolutionary Algorithm Based on Dominated Clustering for Constrained Bi-Objective Optimization Problems.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

2015
Experimental Analysis on CTT-SP Algorithm for Intermediate Data Storage in Scientific Workflow Systems.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

Community Detection Algorithm Based on the Scale Free Property of Networks.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

PSO Based Multiobjective Reliable Optimization Model for Cloud Storage.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

The Robustness of Face-Based CAPTCHAs.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
The Robustness of "Connecting Characters Together" CAPTCHAs.
J. Inf. Sci. Eng., 2014

Adaptive Combination Forecasting Model Based on Area Correlation Degree with Application to China's Energy Consumption.
J. Appl. Math., 2014

A Minimum-Elimination-Escape Function Method for Multimodal Optimization Problems.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Draw a line on your PDA to authenticate.
CoRR, 2013

An audio CAPTCHA to distinguish humans from computers.
CoRR, 2013

On an integrated mapping and scheduling solution to large-scale scientific workflows in resource sharing environments.
Proceedings of the 46th Annual Simulation Symposium, 2013

An Enhanced Domination Based Evolutionary Algorithm for Multi-objective Problems.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

The robustness of hollow CAPTCHAs.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
A GPU-based implementation of an enhanced GEP algorithm.
Proceedings of the Genetic and Evolutionary Computation Conference, 2012

2011
An Enhanced Drawing Reproduction Graphical Password Strategy.
J. Comput. Sci. Technol., 2011

Exploration of a hand-based graphical password scheme.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

A Novel Cued-recall Graphical Password Scheme.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

2010
Cluster based architecture synthesis minimizing the resources under time constraint.
Proceedings of the IEEE International Conference on Acoustics, 2010

A New Graphical Password Scheme Resistant to Shoulder-Surfing.
Proceedings of the 2010 International Conference on CyberWorlds, 2010

A Novel Image Based CAPTCHA Using Jigsaw Puzzle.
Proceedings of the 13th IEEE International Conference on Computational Science and Engineering, 2010

The effect of baroque music on the PassPoints graphical password.
Proceedings of the 9th ACM International Conference on Image and Video Retrieval, 2010

Against Spyware Using CAPTCHA in Graphical Password Scheme.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
A new graphical password scheme against spyware by using CAPTCHA.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Analysis and Evaluation of the ColorLogin Graphical Password Scheme.
Proceedings of the Fifth International Conference on Image and Graphics, 2009

An Effective Reversible Debugger of Cross Platform Based on Virtualization.
Proceedings of the International Conference on Embedded Software and Systems, 2009

2008
DTAD: A Dynamic Taint Analysis Detector for Information Security.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Towards a Reversible BPEL Debugger.
Proceedings of the 2008 IEEE International Conference on Web Services (ICWS 2008), 2008

Fitness calculation approach for the switch-case construct in evolutionary testing.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

YAGP: Yet Another Graphical Password Strategy.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Fitness calculation approach for nested if-else construct in evolutionary testing.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007

DFTL: a Description Language for Transformation of Data Formats.
Proceedings of the 14th Asia-Pacific Software Engineering Conference (APSEC 2007), 2007

Function Call Flow based Fitness Function Design in Evolutionary Testing.
Proceedings of the 14th Asia-Pacific Software Engineering Conference (APSEC 2007), 2007

PORD: a Reversible Debugging Tool using Dynamic Binary Translation.
Proceedings of the 14th Asia-Pacific Software Engineering Conference (APSEC 2007), 2007

2005
Octopus Architecture: A New Attempt to Achieve Reliable OS.
Proceedings of the Fifth Working IEEE / IFIP Conference on Software Architecture (WICSA 2005), 2005

A unified fitness function calculation rule for flag conditions to improve evolutionary testing.
Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), 2005

Evolutionary Testing of Unstructured Programs in the Presence of Flag Problems.
Proceedings of the 12th Asia-Pacific Software Engineering Conference (APSEC 2005), 2005


  Loading...