Research

Research Interests:

Data Security and Privacy

Trustworthy Artificial Intelligence

Internet of Things

Deep Learning

 

Selected Publications:

Conference Papers:

H. Xu, Z. Cai, Z. Xiong and W. Li, Backdoor Attack on 3D Grey Image Segmentation. IEEE International Conference on Data Mining (ICDM), 2023. (Acceptance Ratio: 9.37\%)


H. Xu, Z. Cai and W. Li, Which Option is a Better Way to Improve Transfer Learning Performance?. International Conference on Combinatorial Optimization and Applications (COCOA), Springer, Cham, 2021: 61-74. 

Journal Papers:

H. Xu, Z. Cai and W. Li, Privacy-Preserving Mechanisms for Multi-Label Image Recognition. ACM Transactions on Knowledge Discovery from Data (TKDD), 2022, 16(4): 1-21.(IF: 4.54

H. Xu, Z. Cai, R. Li and W. Li, Efficient CityCam-to-Edge Cooperative Learning for Vehicle Counting in ITS. IEEE Transactions on Intelligent Transportation Systems (TITS), 2022, 23(9), 16600-16611.(IF: 2.534

H. Xu, Z. Cai, D. Takabi and W. Li, Audio-Visual Autoencoding for Privacy-Preserving Video Streaming. IEEE Internet of Things Journal (IoTJ), 2021, 9(3): 1749-1761.(IF: 9.936)

H. Xu, W. Li, and Z. Cai, Analysis on Methods to Effectively Improve Transfer Learning Performance. Theoretical Computer Science (TCS), 2022, 940: 90-107.(IF: 1.002)

Z. Xiong, H. Xu, W. Li and Z. Cai, Multi-Source Adversarial Sample Attack on Autonomous Vehicles. IEEE Transactions on Vehicular Technology (TVT), 2021, 70(3): 2822-2835.(IF: 5.978)

S. De, H. Xu, M. Bermudez-Edo, Z. Cai, Deep Generative Models in the Industrial Internet of Things: A Survey. IEEE Transaction on Industrial Informatics (TII), 2022, 18(9): 5728-5737.(IF: 10.215

Z. Cai, Z. Xiong, H. Xu, P. Wang, W. Li and Y. Pan, Generative Adversarial Networks: A Survey Toward Private and Secure Applications. ACM Computing Surveys (CSUR), 2021, 54(6): 1-38.(IF: 10.282)

©