关注
Yiming Li (李一鸣)
Yiming Li (李一鸣)
在 mails.tsinghua.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Backdoor Learning: A Survey
Y Li, Y Jiang, Z Li, ST Xia
IEEE Transactions on Neural Networks and Learning Systems, 2022
2672022
Invisible Backdoor Attack with Sample-Specific Triggers
Y Li, Y Li, B Wu, L Li, R He, S Lyu
International Conference on Computer Vision (ICCV), 2021
157*2021
Backdoor Attack in the Physical World
Y Li, T Zhai, Y Jiang, Z Li, ST Xia
ICLR Workshop on Robust and Reliable Machine Learning in the Real World, 2021
133*2021
Backdoor Defense via Decoupling the Training Process
K Huang*, Y Li*, B Wu, Z Qin, K Ren
International Conference on Learning Representations (ICLR), 2022
582022
Backdoor Attack against Speaker Verification
T Zhai*, Y Li*, Z Zhang, B Wu, Y Jiang, ST Xia
IEEE International Conference on Acoustics, Speech and Signal Processing …, 2021
582021
Targeted Attack for Deep Hashing based Retrieval
J Bai*, B Chen*, Y Li*, D Wu, W Guo, ST Xia, E Yang
European Conference on Computer Vision (ECCV), 2020
582020
Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits
J Bai, B Wu, Y Zhang, Y Li, Z Li, ST Xia
International Conference on Learning Representations (ICLR), 2021
382021
Multinomial Random Forest
J Bai*, Y Li*, J Li, X Yang, Y Jiang, ST Xia
Pattern Recognition, 108331, 2022
332022
Few-Shot Backdoor Attacks on Visual Object Tracking
Y Li, H Zhong, X Ma, Y Jiang, ST Xia
International Conference on Learning Representations (ICLR), 2022
282022
Semi-supervised robust training with generalized perturbed neighborhood
Y Li, B Wu, Y Feng, Y Fan, Y Jiang, Z Li, ST Xia
Pattern Recognition 124, 108472, 2022
25*2022
Black-box Dataset Ownership Verification via Backdoor Watermarking
Y Li, M Zhu, X Yang, Y Jiang, T Wei, ST Xia
IEEE Transactions on Information Forensics and Security, 2023
24*2023
Hidden Backdoor Attack against Semantic Segmentation Models
Y Li, Y Li, Y Lv, Y Jiang, ST Xia
ICLR Workshop on Security and Safety in Machine Learning Systems, 2021
192021
Revisiting the assumption of latent separability for backdoor defenses
X Qi, T Xie, Y Li, S Mahloujifar, P Mittal
International Conference on Learning Representations (ICLR), 2023
18*2023
Adversarial Defense via Local Flatness Regularization
J Xu*, Y Li*, Y Jiang, ST Xia
IEEE International Conference on Image Processing (ICIP), 2020
172020
Defending against Model Stealing via Verifying Embedded External Features
Y Li, L Zhu, X Jia, Y Jiang, ST Xia, X Cao
AAAI Conference on Artificial Intelligence (AAAI), 2022
16*2022
TNT: An interpretable tree-network-tree learning framework using knowledge distillation
J Li, Y Li, X Xiang, ST Xia, S Dong, Y Cai
Entropy 22 (11), 1203, 2020
142020
BackdoorBox: A Python Toolbox for Backdoor Learning
Y Li, M Ya, Y Bai, Y Jiang, ST Xia
ICLR Workshop on Backdoor Attacks and Defenses in Machine Learning, 2023
122023
Rectified decision trees: exploring the landscape of interpretable and effective machine learning
Y Li, J Bai, J Li, X Yang, Y Jiang, ST Xia
arXiv preprint arXiv:2008.09413, 2020
12*2020
Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protection
Y Li, Y Bai, Y Jiang, Y Yang, ST Xia, B Li
Annual Conference on Neural Information Processing Systems (NeurIPS), 2022
112022
Manhattan Property of Geodesic Paths on Self-affine Carpets
Y Li, L Xi
Archiv der Mathematik 111 (3), 279-285, 2018
112018
系统目前无法执行此操作,请稍后再试。
文章 1–20