学术信息网 西电导航 关于 使用说明 搜索 系统首页 登录 控制面板 收藏 张肖瑜的留言板
代表性论文

1 Xiaoyu Zhang, Yulin Jin, Haoyu Tong, Jian Lou, kai Wu,  Xiaofeng Chen. Purifier+: Plug-and-play Backdoor Mitigation for Pre-trained Models via Activation Alignment,IEEE Transactions on Multimedia (TMM)2024. <accepted> (中科院一区) 

【2】 Xiaoyu Zhang, Chenyang Zhang, Jian Lou, kai Wu, Zilong Wang, Xiaofeng Chen. DuplexGuard: Safeguarding Deletion Right in Machine Unlearning via Duplex WatermarkingIEEE Transactions on Dependable and Secure Computing (IEEE TDSC),  2024. <accepted> (CCF A) 

【3】 Xiaoyu Zhang, Shen Lin, Chao Chen, Xiaofeng Chen. MODA: Model Ownership Deprivation Attack in Asynchronous Federated Learning, IEEE Transactions on Dependable and Secure Computing (IEEE TDSC),  2023. <accepted> (CCF A) 

【4】Shen Lin, Xiaoyu Zhang (共一), Chenyang Chen, Xiaofeng Chen, Willy Susilo. ERM-KTP: Knowledge-level Machine Unlearning via Knowledge Transfer, IEEE International Conference on Computer Vision and Pattern Recognition (CVPR) 2023, 20147-20155. (CCF A)

【5】Xiaoyu Zhang, Yulin Jin, Tao Wang, Jian Lou, Xiaofeng Chen. Purifier: Plug-and-play Backdoor Mitigation for Pre-trained Models Via Anomaly Activation Suppression,  ACM International Conference on Multimedia (ACM MM) , 2022, 4291-4299.  (CCF A)

【6】Xiaoyu Zhang, Xiaofeng Chen, Joseph K. Liu, Yang Xiang. DeepPAR and Deep-DPA: Privacy-Preserving and Asynchronous Deep Learning for Industrial IoT. IEEE Transactions on Industrial Informatics, 2019, 16(3): 2081-2090.(中科院一区)

2025年

【1】Xiaobin Li, Kai Wu, Xiaoyu Zhang, Handing Wang. B2Opt: Learning to Optimize Black-box Optimization with Little Budget,  AAAI,   2025. <accepted> (CCF A) 

2024年

1 Xiaoyu Zhang, Yulin Jin, Haoyu Tong, Jian Lou, kai Wu,  Xiaofeng Chen. Purifier+: Plug-and-play Backdoor Mitigation for Pre-trained Models via Activation Alignment,IEEE Transactions on Multimedia (TMM)2024. <accepted> (中科院一区) 

【2】kai Wu, Yujian Betterest Li, Jian Lou,Xiaoyu Zhang, Handing Wang, Jing Liu. Rapid Plug-in Defenders , Annual Conference on Neural Information Processing Systems  (NeurIPS), 2024.<accepted> (CCF A) 

【3】Xiaobin Li, kai Wu, Yujian Betterest Li,Xiaoyu Zhang, Handing Wang, Jing Liu. Pretrained Optimization Model for Zero-Shot Black Box Optimization, Annual Conference on Neural Information Processing Systems  (NeurIPS), 2024.<accepted> (CCF A) 

【4】 Xiaoyu Zhang, Chenyang Zhang, Jian Lou, kai Wu, Zilong Wang, Xiaofeng Chen. DuplexGuard: Safeguarding Deletion Right in Machine Unlearning via Duplex WatermarkingIEEE Transactions on Dependable and Secure Computing (IEEE TDSC),  2024. <accepted> (CCF A) 

【5】Haoyu Tong, Xiaoyu Zhang (通信), Yulin Jin, Jian Lou, Kai Wu, Xiaofeng Chen, Balancing Generalization and Robustness in Adversarial Training via Steering through Clean and Adversarial Gradient Directions , ACM International Conference on Multimedia (ACM MM) , 2024, accepted.  (CCF A)

【6】Shen Lin, Xiaoyu Zhang, Willy Susilo, Xiaofeng Chen, Jun Liu, GDR-GMA: Machine Unlearning via Direction-Rectified and Magnitude-Adjusted Gradients, ACM International Conference on Multimedia (ACM MM) , 2024, accepted.  (CCF A)

【7】Xinyu Guo, Kai Wu, Xiaoyu Zhang, Jing Liu, Automated Loss function Search for Class-imbalanced Node Classification,  International Conference on Machine Learning (ICML), 2024.<accepted> (CCF A) 

【8】Chenyang Chen, Xiaoyu Zhang (通信), Hongyi Qiu, Jian Lou, Zhengyang Liu, Xiaofeng Chen. MaskArmor: Confidence Masking-based Defense Mechanism for GNN aganist MIA, Information Sciences (INS), 120579, 2024. (中科院一区)

2023年

【1】 Xiaoyu Zhang, Shen Lin, Chao Chen, Xiaofeng Chen. MODA: Model Ownership Deprivation Attack in Asynchronous Federated Learning, IEEE Transactions on Dependable and Secure Computing (IEEE TDSC),  2023. <accepted> (CCF A) 

【2】Shuijing Zhang, Jian Lou, Li Xiong, Xiaoyu Zhang, Jing Liu. Closed-form Machine Unlearning for Matrix Factorization, ACM International Conference on Information and Knowledge Management (ACM CIKM), 3278-3287, 2023. (CCF B)

【3】Yulin Jin, Xiaoyu Zhang (通信), Jian Lou, Xiaofeng Chen. ACQ: Few-shot Backdoor Defense via Activation Clipping and Quantizing, ACM International Conference on Multimedia (ACM MM) , 5410-5418, 2023.  (CCF A)

【4】Yulin Jin, Xiaoyu Zhang (通信), Jian Lou, Xu Ma, Xiaofeng Chen, Zilong Wang. Explaining Adversarial Robustness of Neural Networks from Clustering Effect Perspective, IEEE International Conference on Computer Vision (ICCV) , 4522-4531, 2023.  (CCF A)

【5】Junxu Liu, Mingsheng Xue, Jian Lou, Xiaoyu Zhang, Li Xiong, Zhan Qin. Muter: Machine Unlearning for Adversarial training models, IEEE International Conference on Computer Vision (ICCV) 2023. (CCF A)

【6】Shen Lin, Xiaoyu Zhang (共一), Chenyang Chen, Xiaofeng Chen, Willy Susilo. ERM-KTP: Knowledge-level Machine Unlearning via Knowledge Transfer, IEEE International Conference on Computer Vision and Pattern Recognition (CVPR) 2023, 20147-20155. (CCF A)

2022年

【1】Xiaoyu Zhang, Yulin Jin, Tao Wang, Jian Lou, Xiaofeng Chen. Purifier: Plug-and-play Backdoor Mitigation for Pre-trained Models Via Anomaly Activation Suppression,  ACM International Conference on Multimedia (ACM MM) , 2022, 4291-4299.  (CCF A)

【2】Xiaoyu Zhang, Chao Chen, Yi Xie, Xiaofeng Chen, Jun Zhang, Yang Xiang,  A Survey on Privacy Inference Attacks and Defenses in Cloud-based Deep Neural Network, Computer Standards & Interfaces, 2022, 103672(中科院二区)

2021年

【1】Xiaoyu ZhangXiaofeng Chen, Hongyang Yan, Yang Xiang. Privacy-preserving and Verifiable Online Crowdsourcing with Worker Updates.  Information Sciences, 2021, 548: 212-232. (中科院一区)

【2】Yuqi Chen, Xiaoyu Zhang (通信), Yi Xie, Meixia Miao, Xu Ma. CECMLP: New Cipher-Based Evaluating Collaborative Multi-layer Perceptron Scheme in Federated Learning, International Conference on Applied Cryptography and Network Security (ACNS), 2021, 79-99. (CCF C)

2020年前

【1】Xiaoyu Zhang, Xiaofeng Chen, Joseph K. Liu, Yang Xiang. DeepPAR and Deep-DPA: Privacy-Preserving and Asynchronous Deep Learning for Industrial IoT. IEEE Transactions on Industrial Informatics, 2019, 16(3): 2081-2090.(中科院一区)

【2】Xiaoyu Zhang, Tao Jiang, Kuan-Ching Li, Aniello Castiglione, Xiaofeng Chen. New Publicly Verifiable Computation for Batch Matrix Multiplication. Information Sciences, 2019, 479: 664-678. (中科院一区)

【3】Xiaoyu Zhang, Xiaofeng Chen, Jianfeng Wang, Zhihui Zhan, Jin Li. Verifiable Privacy-preserving Single-layer Perceptron Training Scheme in Cloud Computing. Soft Computing, 2018, 22(23): 7719-7732. (中科院三区)

【4】Xiaoyu Zhang, Tao Jiang, Kuan-Ching Li, Xiaofeng Chen. New Publicly Verifiable Computation for Batch Matrix Multiplication. International Conference on Green, Pervasive, and Cloud Computing, Vol. 10232 (EI)