Follow
Yiming Li
Title
Cited by
Cited by
Year
Backdoor Learning: A Survey
Y Li, Y Jiang, Z Li, ST Xia
IEEE Transactions on Neural Networks and Learning Systems, 2022
6902022
Invisible Backdoor Attack with Sample-Specific Triggers
Y Li, Y Li, B Wu, L Li, R He, S Lyu
International Conference on Computer Vision (ICCV), 2021
5252021
Backdoor Attack in the Physical World
Y Li, T Zhai, Y Jiang, Z Li, ST Xia
ICLR Workshop on Robust and Reliable Machine Learning in the Real World, 2021
276*2021
Backdoor Defense via Decoupling the Training Process
K Huang*, Y Li*, B Wu, Z Qin, K Ren
International Conference on Learning Representations (ICLR), 2022
1982022
Backdoor Attack against Speaker Verification
T Zhai*, Y Li*, Z Zhang, B Wu, Y Jiang, ST Xia
IEEE International Conference on Acoustics, Speech and Signal Processing …, 2021
1192021
Revisiting the Assumption of Latent Separability for Backdoor Defenses
X Qi, T Xie, Y Li, S Mahloujifar, P Mittal
International Conference on Learning Representations (ICLR), 2023
111*2023
Black-box Dataset Ownership Verification via Backdoor Watermarking
Y Li, M Zhu, X Yang, Y Jiang, T Wei, ST Xia
IEEE Transactions on Information Forensics and Security, 2023
106*2023
Targeted Attack for Deep Hashing based Retrieval
J Bai*, B Chen*, Y Li*, D Wu, W Guo, ST Xia, E Yang
European Conference on Computer Vision (ECCV), 2020
932020
Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protection
Y Li, Y Bai, Y Jiang, Y Yang, ST Xia, B Li
Annual Conference on Neural Information Processing Systems (NeurIPS), 2022
872022
Multinomial Random Forest
J Bai*, Y Li*, J Li, X Yang, Y Jiang, ST Xia
Pattern Recognition, 108331, 2022
812022
SCALE-UP: An Efficient Black-box Input-level Backdoor Detection via Analyzing Scaled Prediction Consistency
J Guo*, Y Li*, X Chen, H Guo, L Sun, C Liu
International Conference on Learning Representations (ICLR), 2023
782023
Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits
J Bai, B Wu, Y Zhang, Y Li, Z Li, ST Xia
International Conference on Learning Representations (ICLR), 2021
782021
Defending against Model Stealing via Verifying Embedded External Features
Y Li, L Zhu, X Jia, Y Jiang, ST Xia, X Cao
AAAI Conference on Artificial Intelligence (AAAI), 2022
742022
Few-Shot Backdoor Attacks on Visual Object Tracking
Y Li, H Zhong, X Ma, Y Jiang, ST Xia
International Conference on Learning Representations (ICLR), 2022
682022
Semi-supervised Robust Training with Generalized Perturbed Neighborhood
Y Li, B Wu, Y Feng, Y Fan, Y Jiang, Z Li, ST Xia
Pattern Recognition 124, 108472, 2022
48*2022
Not All Samples Are Born Equal: Towards Effective Clean-Label Backdoor Attacks
Y Gao*, Y Li*, L Zhu*, D Wu, Y Jiang, ST Xia
Pattern Recognition, 109512, 2023
442023
Domain Watermark: Effective and Harmless Dataset Copyright Protection is Closed at Hand
J Guo*, Y Li*, L Wang, ST Xia, H Huang, C Liu, B Li
Annual Conference on Neural Information Processing Systems (NeurIPS), 2023
382023
BackdoorBox: A Python Toolbox for Backdoor Learning
Y Li, M Ya, Y Bai, Y Jiang, ST Xia
ICLR Workshop on Backdoor Attacks and Defenses in Machine Learning, 2023
382023
Generating Transferable 3d Adversarial Point Cloud via Random Perturbation Factorization
B He, J Liu, Y Li, S Liang, J Li, X Jia, X Cao
Proceedings of the AAAI Conference on Artificial Intelligence 37 (1), 764-772, 2023
372023
Untargeted Backdoor Attack against Object Detection
C Luo, Y Li, Y Jiang, ST Xia
IEEE International Conference on Acoustics, Speech and Signal Processing …, 2023
342023
The system can't perform the operation now. Try again later.
Articles 1–20