Da Xiao

Orcid: 0009-0008-2732-5776

Affiliations:
  • Beijing University of Posts and Telecommunications, School of Computer Science, Beijing, China
  • Tsinghua University, Department of Computer Science and Technology, Beijing, China (PhD 2009)


According to our database1, Da Xiao authored at least 15 papers between 2005 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
MUDDFormer: Breaking Residual Bottlenecks in Transformers via Multiway Dynamic Dense Connections.
CoRR, February, 2025

Benchmarking and Understanding Compositional Relational Reasoning of LLMs.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025

2024
Generative Pre-Trained Transformer-Based Reinforcement Learning for Testing Web Application Firewalls.
IEEE Trans. Dependable Secur. Comput., 2024

Improving Transformers with Dynamically Composable Multi-Head Attention.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

2022
Path context augmented statement and network for learning programs.
Empir. Softw. Eng., 2022

2020
Malicious Mail Filtering and Tracing System Based on KNN and Improved LSTM Algorithm.
Proceedings of the IEEE Intl Conf on Dependable, 2020

2019
Obfuscation Algorithms Based on Congruence Equation and Knapsack Problem.
Proceedings of the Advances in Internet, 2019

2018
The Hidden Shape of Stories Reveals Positivity Bias and Gender Bias.
CoRR, 2018

Improving the Universality and Learnability of Neural Programmer-Interpreters with Combinator Abstraction.
Proceedings of the 6th International Conference on Learning Representations, 2018

2017
An end-to-end model for Android malware detection.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

2015
Efficient Data Possession Auditing for Real-World Cloud Storage Environments.
IEICE Trans. Inf. Syst., 2015

2013
A Semi-supervised Ensemble Approach for Mining Data Streams.
J. Comput., 2013

2012
Multiple-File Remote Data Checking for cloud storage.
Comput. Secur., 2012

2009
VAOFS: A Verifiable Append-Only File System for Regulatory Compliance.
Proceedings of the Eighth International Conference on Grid and Cooperative Computing, 2009

2005
TH-VSS: An Asymmetric Storage Virtualization System for the SAN Environment.
Proceedings of the Computational Science, 2005


  Loading...