default search action
Liyao Xiang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Jungang Yang, Liyao Xiang, Pengzhi Chu, Xinbing Wang, Chenghu Zhou:
Certified Distributional Robustness on Smoothed Classifiers. IEEE Trans. Dependable Secur. Comput. 21(2): 876-888 (2024) - [j15]Wei Li, Borui Yang, Hangyu Ye, Liyao Xiang, Qingxiao Tao, Xinbing Wang, Chenghu Zhou:
MiniTracker: Large-Scale Sensitive Information Tracking in Mini Apps. IEEE Trans. Dependable Secur. Comput. 21(4): 2099-2114 (2024) - [j14]Haohua Duan, Zedong Peng, Liyao Xiang, Yuncong Hu, Bo Li:
A Verifiable and Privacy-Preserving Federated Learning Training Framework. IEEE Trans. Dependable Secur. Comput. 21(5): 5046-5058 (2024) - [j13]Hui Xu, Liyao Xiang, Junjie Ou, Yuting Weng, Xinbing Wang, Chenghu Zhou:
Open-World Graph Active Learning for Node Classification. ACM Trans. Knowl. Discov. Data 18(2): 43:1-43:20 (2024) - [j12]Hui Xu, Liyao Xiang, Xiaoying Gan, Luoyi Fu, Xinbing Wang, Chenghu Zhou:
Distributional Learning for Network Alignment with Global Constraints. ACM Trans. Knowl. Discov. Data 18(4): 88:1-88:16 (2024) - [j11]Liyao Xiang, Shuang Zhang, Quanshi Zhang:
Learning to Prevent Input Leakages in the Mobile Cloud Inference. IEEE Trans. Mob. Comput. 23(7): 7650-7663 (2024) - [c26]Hengyuan Xu, Liyao Xiang, Hangyu Ye, Dixi Yao, Pengzhi Chu, Baochun Li:
Permutation Equivariance of Transformers and its Applications. CVPR 2024: 5987-5996 - [c25]Mingxiao Li, Rui Jin, Liyao Xiang, Kaiming Shen, Shuguang Cui:
CROSSWORD: A Semantic Approach To Text Compression Via Masking. ICASSP 2024: 9171-9175 - [c24]Ke Hu, Liyao Xiang, Peng Tang, Weidong Qiu:
Feature Norm Regularized Federated Learning: Utilizing Data Disparities for Model Performance Gains. IJCAI 2024: 4136-4146 - [c23]Zhe Ji, Qiansiqi Hu, Yicheng Zheng, Liyao Xiang, Xinbing Wang:
A Principled Approach to Natural Language Watermarking. ACM Multimedia 2024: 2908-2916 - [c22]Shiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang, Chenghu Zhou, Bo Li:
Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models. NDSS 2024 - [c21]Borui Yang, Wei Li, Liyao Xiang, Bo Li:
SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations. SP 2024: 4088-4106 - [i20]Shiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang, Chenghu Zhou, Bo Li:
Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models. CoRR abs/2401.07205 (2024) - [i19]Xinbing Wang, Luoyi Fu, Xiaoying Gan, Ying Wen, Guanjie Zheng, Jiaxin Ding, Liyao Xiang, Nanyang Ye, Meng Jin, Shiyu Liang, Bin Lu, Haiwen Wang, Yi Xu, Cheng Deng, Shao Zhang, Huquan Kang, Xingli Wang, Qi Li, Zhixin Guo, Jiexing Qi, Pan Liu, Yuyang Ren, Lyuwen Wu, Jungang Yang, Jianping Zhou, Chenghu Zhou:
AceMap: Knowledge Discovery through Academic Graph. CoRR abs/2403.02576 (2024) - [i18]Hengyuan Xu, Liyao Xiang, Xingjun Ma, Borui Yang, Baochun Li:
Hufu: A Modality-Agnositc Watermarking System for Pre-Trained Transformers via Permutation Equivariance. CoRR abs/2403.05842 (2024) - [i17]Hang Yin, Dong Ding, Liyao Xiang, Yuheng He, Yihan Wu, Xinbing Wang, Chenghu Zhou:
Entity Alignment with Unlabeled Dangling Cases. CoRR abs/2403.10978 (2024) - [i16]Jungang Yang, Zhe Ji, Liyao Xiang:
Weights Shuffling for Improving DPSGD in Transformer-based Models. CoRR abs/2407.15414 (2024) - 2023
- [j10]Weiting Li, Liyao Xiang, Bin Guo, Zhetao Li, Xinbing Wang:
DPlanner: A Privacy Budgeting System for Utility. IEEE Trans. Inf. Forensics Secur. 18: 1196-1210 (2023) - [j9]Haohua Duan, Liyao Xiang, Xinbing Wang, Pengzhi Chu, Chenghu Zhou:
A New Zero Knowledge Argument for General Circuits and Its Application. IEEE Trans. Inf. Forensics Secur. 18: 3906-3920 (2023) - [j8]Jungang Yang, Liyao Xiang, Jiahao Yu, Xinbing Wang, Bin Guo, Zhetao Li, Baochun Li:
Matrix Gaussian Mechanisms for Differentially-Private Learning. IEEE Trans. Mob. Comput. 22(2): 1036-1048 (2023) - [j7]Liyao Xiang, Weiting Li, Jungang Yang, Xinbing Wang, Baochun Li:
Differentially-Private Deep Learning With Directional Noise. IEEE Trans. Mob. Comput. 22(5): 2599-2612 (2023) - [c20]Xi Yu, Liyao Xiang, Shiming Wang, Chengnian Long:
Privacy-Preserving Split Learning via Pareto Optimal Search. ESORICS (4) 2023: 123-142 - [c19]Fupei Chen, Liyao Xiang, Hei Victor Cheng, Kaiming Shen:
Deep Learning Enabled Semantic-Secure Communication with Shuffling. GLOBECOM 2023: 6338-6343 - [c18]Zhe Ji, Qiansiqi Hu, Liyao Xiang, Chenghu Zhou:
Mixup Training for Generative Models to Defend Membership Inference Attacks. INFOCOM 2023: 1-10 - [c17]Hui Xu, Liyao Xiang, Femke Huang, Yuting Weng, Ruijie Xu, Xinbing Wang, Chenghu Zhou:
Grace: Graph Self-Distillation and Completion to Mitigate Degree-Related Biases. KDD 2023: 2813-2824 - [c16]Wenyu Wang, Wenhai Lai, Shuyi Ren, Liyao Xiang, Xin Li, Shaobo Niu, Kaiming Shen:
Adaptive Beamforming for Non-Line-of-Sight IRS-Assisted Communications without CSI. PIMRC 2023: 1-6 - [i15]Mingxiao Li, Rui Jin, Liyao Xiang, Kaiming Shen, Shuguang Cui:
Crossword: A Semantic Approach to Data Compression via Masking. CoRR abs/2304.01106 (2023) - [i14]Hengyuan Xu, Liyao Xiang, Hangyu Ye, Dixi Yao, Pengzhi Chu, Baochun Li:
Shuffled Transformer for Privacy-Preserving Split Learning. CoRR abs/2304.07735 (2023) - [i13]Wei Li, Borui Yang, Yujie Sun, Suyu Chen, Ziyun Song, Liyao Xiang, Xinbing Wang, Chenghu Zhou:
Towards Tracing Code Provenance with Code Watermarking. CoRR abs/2305.12461 (2023) - [i12]Borui Yang, Wei Li, Liyao Xiang, Bo Li:
Towards Code Watermarking with Dual-Channel Transformations. CoRR abs/2309.00860 (2023) - 2022
- [j6]Sicong Liu, Yungang Wu, Bin Guo, Yuzhan Wang, Ke Ma, Liyao Xiang, Zhetao Li, Zhiwen Yu:
CAQ: Toward Context-Aware and Self-Adaptive Deep Model Computation for AIoT Applications. IEEE Internet Things J. 9(21): 20801-20814 (2022) - [j5]Ningyi Liao, Shufan Wang, Liyao Xiang, Nanyang Ye, Shuo Shao, Pengzhi Chu:
Achieving adversarial robustness via sparsity. Mach. Learn. 111(2): 685-711 (2022) - [j4]Jungang Yang, Liyao Xiang, Ruidong Chen, Weiting Li, Baochun Li:
Differential Privacy for Tensor-Valued Queries. IEEE Trans. Inf. Forensics Secur. 17: 152-164 (2022) - [c15]Haoyang Ren, Jiaqi Liu, Bin Guo, Chen Qiu, Liyao Xiang, Zhetao Li:
MGRec: Multi-Graph Fusion for Recommendation. BigCom 2022: 266-275 - [c14]Dixi Yao, Liyao Xiang, Hengyuan Xu, Hangyu Ye, Yingqi Chen:
Privacy-Preserving Split Learning via Patch Shuffling over Transformers. ICDM 2022: 638-647 - 2021
- [j3]Qingyong Deng, Shaobo Huang, Zhetao Li, Bin Guo, Liyao Xiang, Rong Ran:
A secure data collection strategy using mobile vehicles joint UAVs in smart city. Comput. Networks 199: 108440 (2021) - [j2]Dixi Yao, Liyao Xiang, Zifan Wang, Jiayu Xu, Chao Li, Xinbing Wang:
Context-Aware Compilation of DNN Training Pipelines across Edge and Cloud. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(4): 188:1-188:27 (2021) - [c13]Hui Xu, Liyao Xiang, Jiahao Yu, Anqi Cao, Xinbing Wang:
Speedup Robust Graph Structure Learning with Low-Rank Information. CIKM 2021: 2241-2250 - [c12]Haoxiang Zhang, Xiaoying Gan, Luoyi Fu, Liyao Xiang, Haiming Jin:
Spatiotemporal Graph Neural Network for Traffic Prediction Exploiting Cascading Behavior. GLOBECOM 2021: 1-6 - [c11]Dixi Yao, Lingdong Wang, Jiayu Xu, Liyao Xiang, Shuo Shao, Yingqi Chen, Yanjun Tong:
Federated Model Search via Reinforcement Learning. ICDCS 2021: 830-840 - [c10]Weiting Li, Liyao Xiang, Zhou Zhou, Feng Peng:
Privacy Budgeting for Growing Machine Learning Datasets. INFOCOM 2021: 1-10 - [c9]Mengyuan Li, Bin Guo, Jiangshan Zhang, Jiaqi Liu, Sicong Liu, Zhiwen Yu, Zhetao Li, Liyao Xiang:
Decentralized Multi-AGV Task Allocation based on Multi-Agent Reinforcement Learning with Information Potential Field Rewards. MASS 2021: 482-489 - [i11]Shuang Zhang, Liyao Xiang, Xi Yu, Pengzhi Chu, Yingqi Chen, Chen Cen, Li Wang:
Privacy-Preserving Federated Learning on Partitioned Attributes. CoRR abs/2104.14383 (2021) - [i10]Jungang Yang, Liyao Xiang, Weiting Li, Wei Liu, Xinbing Wang:
Improved Matrix Gaussian Mechanism for Differential Privacy. CoRR abs/2104.14808 (2021) - [i9]Yuchen Li, Yifan Bao, Liyao Xiang, Junhan Liu, Cen Chen, Li Wang, Xinbing Wang:
Privacy Threats Analysis to Secure Federated Learning. CoRR abs/2106.13076 (2021) - [i8]Mengyuan Li, Bin Guo, Jiangshan Zhang, Jiaqi Liu, Sicong Liu, Zhiwen Yu, Zhetao Li, Liyao Xiang:
Decentralized Multi-AGV Task Allocation based on Multi-Agent Reinforcement Learning with Information Potential Field Rewards. CoRR abs/2108.06886 (2021) - 2020
- [c8]Lingdong Wang, Liyao Xiang, Jiayu Xu, Jiaju Chen, Xing Zhao, Dixi Yao, Xinbing Wang, Baochun Li:
Context-Aware Deep Model Compression for Edge Cloud Computing. ICDCS 2020: 787-797 - [c7]Liyao Xiang, Lingdong Wang, Shufan Wang, Baochun Li:
Achieving Consensus in Privacy-Preserving Decentralized Learning. ICDCS 2020: 899-909 - [c6]Liyao Xiang, Hao Zhang, Haotian Ma, Yifan Zhang, Jie Ren, Quanshi Zhang:
Interpretable Complex-Valued Neural Networks for Privacy Protection. ICLR 2020 - [i7]Hao Zhang, Yiting Chen, Liyao Xiang, Haotian Ma, Jie Shi, Quanshi Zhang:
Deep Quaternion Features for Privacy Protection. CoRR abs/2003.08365 (2020) - [i6]Hao Zhang, Yiting Chen, Haotian Ma, Xu Cheng, Qihan Ren, Liyao Xiang, Jie Shi, Quanshi Zhang:
Rotation-Equivariant Neural Networks for Privacy Protection. CoRR abs/2006.13016 (2020) - [i5]Shufan Wang, Ningyi Liao, Liyao Xiang, Nanyang Ye, Quanshi Zhang:
Achieving Adversarial Robustness via Sparsity. CoRR abs/2009.05423 (2020) - [i4]Hui Xu, Liyao Xiang, Youmin Le, Xiaoying Gan, Yuting Jia, Luoyi Fu, Xinbing Wang:
High-Order Relation Construction and Mining for Graph Matching. CoRR abs/2010.04348 (2020) - [i3]Jungang Yang, Liyao Xiang, Ruidong Chen, Yukun Wang, Wei Wang, Xinbing Wang:
A Distributional Robustness Certificate by Randomized Smoothing. CoRR abs/2010.10987 (2020)
2010 – 2019
- 2019
- [c5]Liyao Xiang, Jingbo Yang, Baochun Li:
Differentially-Private Deep Learning from an optimization Perspective. INFOCOM 2019: 559-567 - [i2]Liyao Xiang, Haotian Ma, Hao Zhang, Yifan Zhang, Quanshi Zhang:
Complex-Valued Neural Networks for Privacy Protection. CoRR abs/1901.09546 (2019) - [i1]Shuang Zhang, Liyao Xiang, Congcong Li, Yixuan Wang, Zeyu Liu, Quanshi Zhang, Bo Li:
Preventing Information Leakage with Neural Architecture Search. CoRR abs/1912.08421 (2019) - 2017
- [j1]Liyao Xiang, Tzu-Yin Tai, Baochun Li, Bo Li:
$Tack: $ Learning Towards Contextual and Ephemeral Indoor Localization With Crowdsourcing. IEEE J. Sel. Areas Commun. 35(4): 863-879 (2017) - [c4]Liyao Xiang, Baochun Li, Bo Li:
Privacy-preserving inference in crowdsourcing systems. CNS 2017: 1-9 - 2015
- [c3]Liyao Xiang, Baochun Li, Bo Li:
Coalition Formation Towards Energy-Efficient Collaborative Mobile Computing. ICCCN 2015: 1-8 - 2014
- [c2]Liyao Xiang, Shiwen Ye, Yuan Feng, Baochun Li, Bo Li:
Ready, Set, Go: Coalesced offloading from mobile devices to the cloud. INFOCOM 2014: 2373-2381 - 2012
- [c1]Liyao Xiang, Gaofei Sun, Jing Liu, Xinbing Wang, Li Li:
A discriminatory pricing double auction for spectrum allocation. WCNC 2012: 1473-1477
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint