Search

Your search keyword '"Cao, Xiaoyu"' showing total 478 results

Search Constraints

Start Over You searched for: Author "Cao, Xiaoyu" Remove constraint Author: "Cao, Xiaoyu" Search Limiters Full Text Remove constraint Search Limiters: Full Text
478 results on '"Cao, Xiaoyu"'

Search Results

1. Stochastic-Robust Planning of Networked Hydrogen-Electrical Microgrids: A Study on Induced Refueling Demand

2. Distributionally Robust Frequency-Constrained Microgrid Scheduling Towards Seamless Islanding

3. TOPIC: A Parallel Association Paradigm for Multi-Object Tracking under Complex Motions and Diverse Scenes

5. FedRecover: Recovering from Poisoning Attacks in Federated Learning using Historical Information

6. FLCert: Provably Secure Federated Learning against Poisoning Attacks

7. FLDetector: Defending Federated Learning Against Model Poisoning Attacks via Detecting Malicious Clients

8. A dataset of ant colonies motion trajectories in indoor and outdoor scenes for social cluster behavior study

9. MPAF: Model Poisoning Attacks to Federated Learning based on Fake Clients

13. Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data

17. FaceGuard: Proactive Deepfake Detection

24. IGrow: A Smart Agriculture Solution to Autonomous Greenhouse Control

25. Understanding the Security of Deepfake Detection

27. Provably Secure Federated Learning against Malicious Clients

28. FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping

29. Certified Robustness of Nearest Neighbors against Data Poisoning and Backdoor Attacks

30. Almost Tight L0-norm Certified Robustness of Top-k Predictions against Adversarial Perturbations

32. Certified Robustness of Graph Neural Networks against Adversarial Structural Perturbation

33. Intrinsic Certified Robustness of Bagging against Data Poisoning Attacks

34. On Certifying Robustness against Backdoor Attacks via Randomized Smoothing

35. Certified Robustness of Community Detection against Adversarial Structural Perturbation via Randomized Smoothing

36. Certified Robustness for Top-k Predictions against Adversarial Perturbations via Randomized Smoothing

37. Local Model Poisoning Attacks to Byzantine-Robust Federated Learning

38. Data Poisoning Attacks to Local Differential Privacy Protocols

40. IPGuard: Protecting Intellectual Property of Deep Neural Networks via Fingerprinting the Classification Boundary

45. A Study on the Strong Duality of Conic Relaxation of AC Optimal Power Flow in Radial Networks

Catalog

Books, media, physical & digital resources