Adversarial examples: Attacks and defenses for deep learning X Yuan, P He, Q Zhu, X Li IEEE Transactions on Neural Networks and Learning Systems (TNNLS), 2017 | 2013 | 2017 |
DeepDefense: identifying DDoS attack via deep learning X Yuan, C Li, X Li 2017 IEEE international conference on smart computing (SMARTCOMP), 1-8, 2017 | 440 | 2017 |
Detection and defense of DDoS attack–based on deep learning in OpenFlow‐based SDN C Li, Y Wu, X Yuan, Z Sun, W Wang, X Li, L Gong International Journal of Communication Systems 31 (5), e3497, 2018 | 246 | 2018 |
Phd forum: Deep learning-based real-time malware detection with multi-stage analysis X Yuan 2017 IEEE International Conference on Smart Computing (SMARTCOMP), 1-2, 2017 | 51 | 2017 |
Membership Inference Attacks and Defenses in Neural Network Pruning X Yuan, L Zhang 31st USENIX Security Symposium (USENIX Security 22), 2022 | 43 | 2022 |
ES attack: Model stealing against deep neural networks without data hurdles X Yuan, L Ding, L Zhang, X Li, DO Wu IEEE Transactions on Emerging Topics in Computational Intelligence 6 (5 …, 2022 | 40 | 2022 |
Generalized Batch Normalization: Towards Accelerating Deep Neural Networks X Yuan, Z Feng, M Norton, X Li AAAI 2019, 2019 | 34 | 2019 |
Fedzkt: Zero-shot knowledge transfer towards resource-constrained federated learning with heterogeneous on-device models L Zhang, D Wu, X Yuan 2022 IEEE 42nd International Conference on Distributed Computing Systems …, 2022 | 33 | 2022 |
A methodology for continuous evaluation of cloud resiliency X Yuan, L Wang, T Liu, Y Zhang American Journal of Engineering and Applied Sciences 9, 264-273, 2016 | 28 | 2016 |
Beyond class-level privacy leakage: Breaking record-level privacy in federated learning X Yuan, X Ma, L Zhang, Y Fang, D Wu IEEE Internet of Things Journal 9 (4), 2555-2565, 2021 | 27 | 2021 |
An Analysis on Availability Commitment and Penalty in Cloud SLA X Yuan, Y Li, T Jia, T Liu, Z Wu Computer Software and Applications Conference (COMPSAC), 2015 IEEE 39th …, 2015 | 26* | 2015 |
Adaptive adversarial attack on scene text recognition X Yuan, P He, X Li, D Wu IEEE International Conference on Computer Communications (INFOCOM) Workshop …, 2020 | 25 | 2020 |
Intelligent perioperative system: towards real-time big data analytics in surgery risk assessment Z Feng, RR Bhat, X Yuan, D Freeman, T Baslanti, A Bihorac, X Li 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th …, 2017 | 21 | 2017 |
A competitive penalty model for availability based cloud SLA X Yuan, H Tang, Y Li, T Jia, T Liu, Z Wu Cloud computing (CLOUD), 2015 IEEE 8th International Conference on, 964-970, 2015 | 20* | 2015 |
Identifying Mg ii narrow absorption lines with deep learning Y Zhao, J Ge, X Yuan, T Zhao, C Wang, X Li Monthly Notices of the Royal Astronomical Society 487 (1), 801-811, 2019 | 19 | 2019 |
Learning fast and slow: Propedeutica for real-time malware detection R Sun, X Yuan, P He, Q Zhu, A Chen, A Gregio, D Oliveira, X Li IEEE Transactions on Neural Networks and Learning Systems, 2021 | 18 | 2021 |
Pay "Attention" to Adverse Weather: Weather-aware Attention-based Object Detection SS Chaturvedi, L Zhang, X Yuan 26th International Conference on Pattern Recognition (ICPR), 4573-4579, 2022 | 16 | 2022 |
A vertical federated learning framework for horizontally partitioned labels W Xia, Y Li, L Zhang, Z Wu, X Yuan arXiv preprint arXiv:2106.10056, 2021 | 15 | 2021 |
A Praise for Defensive Programming: Leveraging Uncertainty for Effective Malware Mitigation R Sun, M Botacin, N Sapountzis, X Yuan, M Bishop, DE Porter, X Li, ... IEEE Transactions on Dependable and Secure Computing, 2020 | 12 | 2020 |
Dependability analysis on open stack IaaS cloud: bug analysis and fault injection Y Xiaoyong, L Ying, W Zhonghai, L Tiancheng 2014 IEEE 6th International Conference on Cloud Computing Technology and …, 2014 | 10 | 2014 |