代表性论文:
[1] Yige Li, Xixiang Lyu, Nodens Koren, Lingjuan Lyu, Bo Li, Xingjun Ma, Anti-Backdoor Learning: Training Clean Models on Poisoned Data, NeurIPS 2021. (NeurIPS是人工智能顶会,H5-index 278,最新谷歌学术期刊和会议影响力榜单排名第12, CCF A类)
[2] Yige Li, Xixiang Lyu, Nodens Koren, Lingjuan Lyu, Bo Li, Xingjun Ma, Neural Attention Distillation: Erasing Backdoor Triggers from Deep Neural Networks, ICLR 2021. (ICLR是人工智能顶会,H5-index 286,最新谷歌学术期刊和会议影响力榜单排名第10,在最新版《清华大学计算机学科推荐学术会议和期刊列表》中评定为A类会议。)
[3] Yige Li, Xixiang Lyu, et al., Reconstructive Neuron Pruning for Backdoor Defense,ICML 2023.(ICML是人工智能顶会,H5-index 238,最新谷歌学术期刊和会议影响力榜单排名第19, CCF A类).
[4] Haosen Sun, Yiming Li, Xixiang Lyu, Jing Ma, Learning from Distinction: Mitigating Backdoors Using a Low-Capacity Model, in Proceedings of the 32nd ACM International Conference on Multimedia, https://doi.org/10.1145/3664647.3680968, 2024. (CCF A类,多媒体领域及多模态领域顶会议)
[5] RenPeng Zou , Xixiang Lyu, Jing Ma, Bowen Zhang , Danfang Wu, BCMIX: A Blockchain-based Dynamic Self-reconfigurable Mixnet,IEEE/ACM Transactions on Networking, 2023.31(5):2222 – 2235. (中科院升级版JCR一区,Top期刊)
[6] Jing Ma, Si-Ahmed Naas, Stephan Sigg, Xixiang Lyu, Privacy-Preserving Federated Learning based on Multi-key Homomorphic Encryption, International Journal of Intelligent System, 2022, 37:5880-5901. (高被引论文)
[7] Xixiang Lv, Yi Mu, Hui Li, Non-interactive Key Establishment for Bundle Security Protocol of Space DTNs, IEEE Transactions on Information Forensics and Security, 2014, 9(1): 5-13. (CCF A类,中科院升级版JCR一区,Top期刊)
[8] Xixiang Lv, Yi Mu, Hui Li, Loss-tolerant Bundle Fragment Authentication for Space-based DTNs. IEEE Transactions on Dependable & Secure Computing, 2015, 12(6):1-1. (CCF A类,中科院升级版JCR一区,Top期刊)