Follow
Huang Xiao
Huang Xiao
HSBC
Verified email at hsbc.com
Title
Cited by
Cited by
Year
Is feature selection secure against training data poisoning?
H Xiao, B Biggio, G Brown, G Fumera, C Eckert, F Roli
international conference on machine learning, 1689-1698, 2015
5302015
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security
Felix Fischer, Konstantin Bottinger, Huang Xiao, Christian Stransky, Yasemin ...
IEEE Symposium on Security and Privacy, 2017
377*2017
Adversarial label flips attack on support vector machines
H Xiao, H Xiao, C Eckert
ECAI 2012, 870-875, 2012
3062012
Support Vector Machines under Adversarial Label Contamination
H Xiao, B Biggiob, B Nelsonb, H Xiaoa, C Eckerta, F Rolib
Journal of Neurocomputing 160, 53–62, 2015
2952015
Wasserstein adversarial imitation learning
H Xiao, M Herman, J Wagner, S Ziesche, J Etesami, TH Linh
arXiv preprint arXiv:1906.08113, 2019
842019
Stack overflow considered helpful! deep learning security nudges towards stronger cryptography
F Fischer, H Xiao, CY Kao, Y Stachelscheid, B Johnson, D Razar, ...
28th USENIX Security Symposium (USENIX Security 19), 339-356, 2019
462019
Learning from multiple observers with unknown expertise
H Xiao, H Xiao, C Eckert
Advances in Knowledge Discovery and Data Mining: 17th Pacific-Asia …, 2013
242013
Grammatical inference algorithms in matlab
HI Akram, C De La Higuera, H Xiao, C Eckert
Grammatical Inference: Theoretical Results and Applications: 10th …, 2010
232010
Adversarial and secure machine learning
H Xiao
Technische Universität München, 2017
122017
OPARS: Objective photo aesthetics ranking system
H Xiao, H Xiao, C Eckert
Advances in Information Retrieval: 35th European Conference on IR Research …, 2013
92013
Indicative support vector clustering with its application on anomaly detection
H Xiao, C Eckert
2013 12th International Conference on Machine Learning and Applications 1 …, 2013
42013
Artificial Intelligence for Cybersecurity: Develop AI approaches to solve cybersecurity problems in your organization
B Kolosnjaji, H Xiao, P Xu, A Zarras
Packt Publishing Ltd, 2024
2024
Network inventory management and anomaly detection system
H Xiao, G Webster, B Kolosnjaji, A Carney
US Patent App. 17/945,711, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–13