Yiming Li (李一鸣)
Yiming Li (李一鸣)
Ph.D. Candidate, Tsinghua University
在 mails.tsinghua.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Backdoor Learning: A Survey
Y Li, B Wu, Y Jiang, Z Li, ST Xia
arXiv preprint arXiv:2007.08745, 2020
342020
Backdoor Attack in the Physical World
Y Li, T Zhai, Y Jiang, Z Li, ST Xia
ICLR Workshop on Robust and Reliable Machine Learning in the Real World, 2021
26*2021
Targeted Attack for Deep Hashing based Retrieval
J Bai*, B Chen*, Y Li*, D Wu, W Guo, ST Xia, E Yang
European Conference on Computer Vision (ECCV), 2020
182020
Manhattan Property of Geodesic Paths on Self-affine Carpets
Y Li, L Xi
Archiv der Mathematik 111 (3), 279-285, 2018
102018
Backdoor Attack against Speaker Verification
T Zhai*, Y Li*, Z Zhang, B Wu, Y Jiang, ST Xia
IEEE International Conference on Acoustics, Speech and Signal Processing …, 2021
82021
Invisible Backdoor Attack with Sample-Specific Triggers
Y Li, Y Li, B Wu, L Li, R He, S Lyu
International Conference on Computer Vision (ICCV), 2021
7*2021
Rectified Decision Trees: Exploring the Landscape of Interpretable and Effective Machine Learning
Y Li, J Bai, J Li, X Yang, Y Jiang, ST Xia
arXiv preprint arXiv:2008.09413, 2020
7*2020
Toward Adversarial Robustness via Semi-supervised Robust Training
Y Li, B Wu, Y Feng, Y Fan, Y Jiang, Z Li, ST Xia
arXiv preprint arXiv:2003.06974, 2020
62020
Adversarial Defense via Local Flatness Regularization
J Xu*, Y Li*, Y Jiang, ST Xia
IEEE International Conference on Image Processing (ICIP), 2020
62020
Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits
J Bai, B Wu, Y Zhang, Y Li, Z Li, ST Xia
International Conference on Learning Representations (ICLR), 2021
32021
TNT: An Interpretable Tree-Network-Tree Learning Framework using Knowledge Distillation
J Li, Y Li, X Xiang, ST Xia, S Dong, Y Cai
Entropy 22 (11), 1203, 2020
32020
Open-sourced Dataset Protection via Backdoor Watermarking
Y Li, Z Zhang, J Bai, B Wu, Y Jiang, ST Xia
NeurIPS Workshop on Dataset Curation and Security, 2020
32020
Traffic Flow Prediction with Big Data: A Learning Approach based on SIS-complex networks
Y Li, L Zhao, Z Yu, S Wang
IEEE Information Technology, Networking, Electronic and Automation Control …, 2017
32017
Hidden Backdoor Attack against Semantic Segmentation Models
Y Li, Y Li, Y Lv, Y Jiang, ST Xia
ICLR Workshop on Security and Safety in Machine Learning Systems, 2021
12021
Visual Privacy Protection via Mapping Distortion
Y Li, P Liu, Y Jiang, ST Xia
IEEE International Conference on Acoustics, Speech and Signal Processing …, 2021
12021
--means: A Robust and Stable -means Variant
Y Li, Y Zhang, Q Tang, W Huang, Y Jiang, ST Xia
IEEE International Conference on Acoustics, Speech and Signal Processing …, 2021
12021
Regional Adversarial Training for Better Robust Generalization
C Song, Y Fan, Y Yang, B Wu, Y Li, Z Li, K He
arXiv preprint arXiv:2109.00678, 2021
2021
Defending against Model Stealing via Verifying Embedded External Features
L Zhu*, Y Li*, X Jia, Y Jiang, ST Xia, X Cao
ICML 2021 Workshop on Adversarial Machine Learning, 2021
2021
Multinomial Random Forest: Toward Consistency and Privacy-Preservation
Y Li, J Bai, J Li, X Yang, Y Jiang, C Li, ST Xia
arXiv preprint arXiv:1903.04003, 2019
2019
系统目前无法执行此操作,请稍后再试。
文章 1–19