Yingqi Liu

Orcid: 0000-0002-8312-0088

According to our database1, Yingqi Liu authored at least 57 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Multi-Attack Intrusion Detection for In-Vehicle CAN-FD Messages.
Sensors, June, 2024

AdaptBIR: Adaptive Blind Image Restoration with latent diffusion prior for higher fidelity.
Pattern Recognit., 2024

Boosting the Performance of Decentralized Federated Learning via Catalyst Acceleration.
CoRR, 2024

Decentralized Directed Collaboration for Personalized Federated Learning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

Lotus: Evasive and Resilient Backdoor Attacks through Sub-Partitioning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

2023
Towards More Suitable Personalization in Federated Learning via Decentralized Partial Model Training.
CoRR, 2023

Towards the Flatter Landscape and Better Generalization in Federated Learning under Client-level Differential Privacy.
CoRR, 2023

PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis.
Proceedings of the 32nd USENIX Security Symposium, 2023

ImU: Physical Impersonating Attack for Face Recognition System with Natural Style Changes.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Django: Detecting Trojans in Object Detection Models via Gaussian Focus Calibration.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

MEDIC: Remove Model Backdoors via Importance Driven Cloning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Make Landscape Flatter in Differentially Private Federated Learning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Detecting Backdoors in Pre-trained Encoders.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
Max-Margin Deep Diverse Latent Dirichlet Allocation With Continual Learning.
IEEE Trans. Cybern., 2022

Infrared-Visible Image Fusion Based on Semantic Guidance and Visual Perception.
Entropy, 2022

Backdoor Vulnerabilities in Normally Trained Deep Learning Models.
CoRR, 2022

DECK: Model Hardening for Defending Pervasive Backdoors.
CoRR, 2022

NTIRE 2022 Challenge on Efficient Super-Resolution: Methods and Results.
CoRR, 2022

Constrained Optimization with Dynamic Bound-scaling for Effective NLPBackdoor Defense.
CoRR, 2022

Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Security.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Piccolo: Exposing Complex Backdoors in NLP Transformer Models.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

MIRROR: Model Inversion for Deep LearningNetwork with High Fidelity.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Traffic Analytics Development Kits (TADK): Enable Real-Time AI Inference in Networking Apps.
Proceedings of the Thirteenth International Conference on Ubiquitous and Future Networks, 2022

Constrained Optimization with Dynamic Bound-scaling for Effective NLP Backdoor Defense.
Proceedings of the International Conference on Machine Learning, 2022

Efficient Image Super-Resolution Using Vast-Receptive-Field Attention.
Proceedings of the Computer Vision - ECCV 2022 Workshops, 2022

Better Trigger Inversion Optimization in Backdoor Scanning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Complex Backdoor Detection by Symmetric Feature Differencing.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

NTIRE 2022 Challenge on Efficient Super-Resolution: Methods and Results.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2022

Blueprint Separable Residual Network for Efficient Image Super-Resolution.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2022

2021
EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry.
CoRR, 2021

Turning Danger into Safety: The Origin, Research Context and Theoretical Framework of Organizational Resilience.
IEEE Access, 2021

Backdoor Scanning for Deep Neural Networks through K-Arm Optimization.
Proceedings of the 38th International Conference on Machine Learning, 2021

Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Black-box adversarial sample generation based on differential evolution.
J. Syst. Softw., 2020

Recognizing the HRRP by Combining CNN and BiRNN With Attention Mechanism.
IEEE Access, 2020

TRADER: trace divergence analysis and embedding regulation for debugging recurrent neural networks.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Composite Backdoor Attack for Deep Neural Network by Mixing Existing Benign Features.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Programming support for autonomizing software.
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2019

NIC: Detecting Adversarial Samples with Neural Network Invariant Checking.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Research on Comprehensive Evaluation System of Property Service Enterprises.
Proceedings of the 10th International Conference on E-business, Management and Economics, 2019

White-Box Program Tuning.
Proceedings of the IEEE/ACM International Symposium on Code Generation and Optimization, 2019

ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Remaining useful life estimation of engineered systems using vanilla LSTM neural networks.
Neurocomputing, 2018

MODE: automated neural network model debugging via state differential analysis and input selection.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018

Trojaning Attack on Neural Networks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
LAMP: data provenance for graph based machine learning algorithms through derivative computation.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

PAD: programming third-party web advertisement censorship.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

2015
A Detection and Measurement Approach for Memory Leaked Objects in Java Programs.
IEICE Trans. Inf. Syst., 2015

Impact of agricultural industrial structure adjustment on energy conservation and income growth in Western China: a statistical study.
Ann. Oper. Res., 2015

Mitigating the Dependence Confounding Effect for Effective Predicate-Based Statistical Fault Localization.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2014
An approach for test data generation using program slicing and particle swarm optimization.
Neural Comput. Appl., 2014

2013
An Approach for Fault Localization Based on Program Slicing and Bayesian.
Proceedings of the 2013 13th International Conference on Quality Software, 2013

2012
Fault Localization for Null Pointer Exception Based on Stack Trace and Program Slicing.
Proceedings of the 2012 12th International Conference on Quality Software, 2012

2011
The Analysis of China New Energy Vehicle Industry Alliance Status Based on UCINET Software.
J. Comput., 2011


  Loading...