default search action
Yingxiao Xiang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Yalun Wu, Yingxiao Xiang, Endong Tong, Yuqi Ye, Zhibo Cui, Yunzhe Tian, Lejun Zhang, Jiqiang Liu, Zhen Han, Wenjia Niu:
Improving the Robustness of Pedestrian Detection in Autonomous Driving With Generative Data Augmentation. IEEE Netw. 38(3): 63-69 (2024) - 2023
- [j6]Tong Chen, Jiqiang Liu, Thar Baker, Yalun Wu, Yingxiao Xiang, Yike Li, Wenjia Niu, Endong Tong, Albert Y. Zomaya:
A Mutual Information-Based Assessment of Reverse Engineering on Rewards of Reinforcement Learning. IEEE Trans. Artif. Intell. 4(5): 1089-1100 (2023) - 2022
- [j5]Yingxiao Xiang, Chao Li, Tong Chen, Yike Li, Endong Tong, Wenjia Niu, Qiong Li, Jiqiang Liu, Wei Wang:
Toward Blockchain-Based Spoofing Defense for Controlled Optimization of Phases in Traffic Signal System. IEICE Trans. Inf. Syst. 105-D(2): 280-288 (2022) - [j4]Yike Li, Wenjia Niu, Yunzhe Tian, Tong Chen, Zhiqiang Xie, Yalun Wu, Yingxiao Xiang, Endong Tong, Thar Baker, Jiqiang Liu:
Multiagent Reinforcement Learning-Based Signal Planning for Resisting Congestion Attack in Green Transportation. IEEE Trans. Green Commun. Netw. 6(3): 1448-1458 (2022) - 2021
- [j3]Tong Chen, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Endong Tong, Shuoru Wang, He Li, Liang Chang, Gang Li, Qi Alfred Chen:
Adversarial retraining attack of asynchronous advantage actor-critic based pathfinding. Int. J. Intell. Syst. 36(5): 2323-2346 (2021) - [c13]Zhiqiang Xie, Yingxiao Xiang, Yike Li, Shuang Zhao, Endong Tong, Wenjia Niu, Jiqiang Liu, Jian Wang:
Security Analysis of Poisoning Attacks Against Multi-agent Reinforcement Learning. ICA3PP (1) 2021: 660-675 - [c12]Tong Chen, Yingxiao Xiang, Yike Li, Yunzhe Tian, Endong Tong, Wenjia Niu, Jiqiang Liu, Gang Li, Qi Alfred Chen:
Protecting Reward Function of Reinforcement Learning via Minimal and Non-catastrophic Adversarial Trajectory. SRDS 2021: 299-309 - 2020
- [j2]Yike Li, Yingxiao Xiang, Endong Tong, Wenjia Niu, Bowei Jia, Long Li, Jiqiang Liu, Zhen Han:
An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method. Wirel. Commun. Mob. Comput. 2020: 8823300:1-8823300:14 (2020) - [c11]Xiaojin Wang, Yingxiao Xiang, Wenjia Niu, Endong Tong, Jiqiang Liu:
Explainable Congestion Attack Prediction and Software-level Reinforcement in Intelligent Traffic Signal System. ICPADS 2020: 667-672 - [c10]Xu Gao, Jiqiang Liu, Yike Li, Xiaojin Wang, Yingxiao Xiang, Endong Tong, Wenjia Niu, Zhen Han:
Queue Length Estimation Based Defence Against Data Poisoning Attack for Traffic Signal Control. Intelligent Information Processing 2020: 254-265 - [c9]Xiaojin Wang, Yingxiao Xiang, Wenjia Niu, Endong Tong, Qi Alfred Chen, Gang Li, Jiqiang Liu, Long Li:
Constructing Optimal Sparse Decision Tree for Analying I-SIG System Attack. ISPA/BDCloud/SocialCom/SustainCom 2020: 321-328
2010 – 2019
- 2019
- [j1]Tong Chen, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Endong Tong, Zhen Han:
Adversarial attack and defense in reinforcement learning-from AI security view. Cybersecur. 2(1): 11 (2019) - 2018
- [c8]Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen, Zhen Han:
A PCA-Based Model to Predict Adversarial Examples on Q-Learning of Path Finding. DSC 2018: 773-780 - [c7]XiaoXuan Bai, Wenjia Niu, Jiqiang Liu, Xu Gao, Yingxiao Xiang, Jingjing Liu:
Adversarial Examples Construction Towards White-Box Q Table Variation in DQN Pathfinding Training. DSC 2018: 781-787 - [c6]Chunjing Qiu, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Tong Chen:
Intention-Aware Multi-channel Keyword Extension for Content Security. DSC 2018: 788-794 - [c5]Shuanshuan Pang, Wenjia Niu, Jiqiang Liu, Yingxiao Xiang, Yingdi Wang:
An Approach to Generate Topic Similar Document by Seed Extraction-Based SeqGAN Training for Bait Document. DSC 2018: 803-810 - [c4]Xu Gao, Wenjia Niu, Jingjing Liu, Tong Chen, Yingxiao Xiang, XiaoXuan Bai, Jiqiang Liu:
A DeepWalk-Based Approach to Defend Profile Injection Attack in Recommendation System. Intelligent Information Processing 2018: 213-222 - [i2]Tong Chen, Wenjia Niu, Yingxiao Xiang, XiaoXuan Bai, Jiqiang Liu, Zhen Han, Gang Li:
Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding. CoRR abs/1807.06752 (2018) - [i1]Yingdi Wang, Wenjia Niu, Tong Chen, Yingxiao Xiang, Jingjing Liu, Gang Li, Jiqiang Liu:
A Training-based Identification Approach to VIN Adversarial Examples. CoRR abs/1810.08070 (2018) - 2017
- [c3]Jingjing Liu, Wenjia Niu, Jiqiang Liu, Jia Zhao, Tong Chen, Yinqi Yang, Yingxiao Xiang, Lei Han:
A Method to Effectively Detect Vulnerabilities on Path Planning of VIN. ICICS 2017: 374-384 - [c2]XiaoXuan Bai, Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen, Jingjing Liu, Tong Wu:
A Cross-Modal CCA-Based Astroturfing Detection Approach. ICICS 2017: 582-592 - [c1]Tong Chen, Noora Hashim Alallaq, Wenjia Niu, Yingdi Wang, XiaoXuan Bai, Jingjing Liu, Yingxiao Xiang, Tong Wu, Jiqiang Liu:
A Hidden Astroturfing Detection Approach Base on Emotion Analysis. KSEM 2017: 55-66
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-10 00:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint