学术信息网 西电导航 关于 使用说明 搜索 系统首页 登录 控制面板 收藏 吕锡香的留言板
学术论文

代表性论文:

[1] Yige Li, Xixiang Lyu, Nodens Koren, Lingjuan Lyu, Bo Li, Xingjun Ma, Anti-Backdoor Learning: Training Clean Models on Poisoned Data, NeurIPS 2021. NeurIPS是人工智能顶会,H5-index 278,最新谷歌学术期刊和会议影响力榜单排名第12, CCF A类)

[2] Yige Li, Xixiang Lyu, Nodens Koren, Lingjuan Lyu, Bo Li, Xingjun Ma, Neural Attention Distillation: Erasing Backdoor Triggers from Deep Neural Networks, ICLR 2021. ICLR是人工智能顶会,H5-index 286,最新谷歌学术期刊和会议影响力榜单排名第10,在最新版《清华大学计算机学科推荐学术会议和期刊列表》中评定为A类会议。)

[3] Yige Li, Xixiang Lyu, et al., Reconstructive Neuron Pruning for Backdoor DefenseICML 2023.ICML是人工智能顶会,H5-index 238,最新谷歌学术期刊和会议影响力榜单排名第19, CCF A类).

[4] Haosen Sun, Yiming Li, Xixiang Lyu, Jing Ma, Learning from Distinction: Mitigating Backdoors Using a Low-Capacity Model, in Proceedings of the 32nd ACM International Conference on Multimedia, https://doi.org/10.1145/3664647.3680968, 2024. CCF A类,多媒体领域及多模态领域顶会议

[5] RenPeng Zou , Xixiang Lyu, Jing Ma, Bowen Zhang , Danfang Wu, BCMIX: A Blockchain-based Dynamic Self-reconfigurable MixnetIEEE/ACM Transactions on Networking, 2023.31(5):2222 – 2235. (中科院升级版JCR一区,Top期刊)

[6] Jing Ma, Si-Ahmed Naas, Stephan Sigg, Xixiang Lyu, Privacy-Preserving Federated Learning based on Multi-key Homomorphic Encryption, International Journal of Intelligent System, 2022, 37:5880-5901. 高被引论文

[7] Xixiang Lv, Yi Mu, Hui Li, Non-interactive Key Establishment for Bundle Security Protocol of Space DTNs, IEEE Transactions on Information Forensics and Security, 2014, 9(1): 5-13. CCF A类,中科院升级版JCR一区,Top期刊)

[8] Xixiang Lv, Yi Mu, Hui Li, Loss-tolerant Bundle Fragment Authentication for Space-based DTNs. IEEE Transactions on Dependable & Secure Computing, 2015, 12(6):1-1. CCF A类,中科院升级版JCR一区,Top期刊)