Tao Xie

According to our database1, Tao Xie authored at least 175 papers between 2005 and 2021.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2018, "For contributions to software testing and analytics".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Fault Analysis and Debugging of Microservice Systems: Industrial Survey, Benchmark System, and Empirical Study.
IEEE Trans. Software Eng., 2021

2020
On automation in software engineering.
Softw. Test. Verification Reliab., 2020

Conference Virtualization.
Softw. Test. Verification Reliab., 2020

Working Across Boundaries.
Softw. Test. Verification Reliab., 2020

The AI Effect: Working at the Intersection of AI and SE.
IEEE Softw., 2020

Expert Perspectives on AI.
IEEE Softw., 2020

Peer Reviewing in Software Engineering: Perspectives from STVR Co-Editors-in-Chief.
ACM SIGSOFT Softw. Eng. Notes, 2020

Visual Robot Relocalization Based on Multi-Task CNN and Image-Similarity Strategy.
Sensors, 2020

An Automatic Bearing Fault Diagnosis Method Based on Characteristics Frequency Ratio.
Sensors, 2020

Preface.
J. Comput. Sci. Technol., 2020

See now, act now: How to interact with customers to enhance social commerce engagement?
Inf. Manag., 2020

Graph-ranking collective Chinese entity linking algorithm.
Frontiers Comput. Sci., 2020

Imbalance Fault Detection Based on the Integrated Analysis Strategy for Marine Current Turbines under Variable Current Speed.
Entropy, 2020

Adversarial Attack on Large Scale Graph.
CoRR, 2020

A Survey of Adversarial Learning on Graphs.
CoRR, 2020

Active Control for Wall Drag Reduction: Methods, Mechanisms and Performance.
IEEE Access, 2020

Nonlinear Dynamic Analysis of Rotor-Bearing-Pedestal Systems With Multiple Fit Clearances.
IEEE Access, 2020

A Novel Marine Oil Spillage Identification Scheme Based on Convolution Neural Network Feature Extraction From Fully Polarimetric SAR Imagery.
IEEE Access, 2020

A Power-Efficient Optimizing Framework FPGA Accelerator Based on Winograd for YOLO.
IEEE Access, 2020

Clustering test steps in natural language toward automating test automation.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

Graph-based trace analysis for microservice architecture understanding and problem diagnosis.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

Privacy-Preserving Reputation Management for Blockchain-Based Mobile Crowdsensing.
Proceedings of the 17th Annual IEEE International Conference on Sensing, 2020

BORA: a bag optimizer for robotic analysis.
Proceedings of the SC '20: The International Conference for High Performance Computing, 2020

A VMD Denoising-based Imbalance Fault Detection Method for Marine Current Turbine.
Proceedings of the 46th Annual Conference of the IEEE Industrial Electronics Society, 2020

Database-Access Performance Antipatterns in Database-Backed Web Applications.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2020

JSidentify: a hybrid framework for detecting plagiarism among JavaScript code in online mini games.
Proceedings of the ICSE-SEIP 2020: 42nd International Conference on Software Engineering, Software Engineering in Practice, Seoul, South Korea, 27 June, 2020

Location Privacy-Preserving Truth Discovery in Mobile Crowd Sensing.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

BIMP: Blockchain-Based Incentive Mechanism with Privacy Preserving in Location Proof.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

An Empirical Analysis of Skewed Temporal Data for Distribution-based Course Similarity.
Proceedings of the 13th International Conference on Educational Data Mining, 2020

Study on Superpixel-Level Sea Clutter Statistical Model for SAR Imagery.
Proceedings of the 5th International Conference on Control, Robotics and Cybernetics, 2020

Ship Detection Based on Superpixel-Level Hybrid Non-local MRF for SAR Imagery.
Proceedings of the 5th Asia-Pacific Conference on Intelligent Robot Systems, 2020

Abstractive Summarization Model with a Feature-Enhanced Seq2Seq Structure.
Proceedings of the 5th Asia-Pacific Conference on Intelligent Robot Systems, 2020

2019
Editorial: New Chapter Ahead.
Softw. Test. Verification Reliab., 2019

A Sparse Autoencoder and Softmax Regression Based Diagnosis Method for the Attachment on the Blades of Marine Current Turbine.
Sensors, 2019

A New Self-Powered Sensor Using the Radial Field Piezoelectric Diaphragm in d<sub>33</sub> Mode for Detecting Underwater Disturbances.
Sensors, 2019

PSDSD-A Superpixel Generating Method Based on Pixel Saliency Difference and Spatial Distance for SAR Images.
Sensors, 2019

A Self-Learning Fault Diagnosis Strategy Based on Multi-Model Fusion.
Inf., 2019

Positioning optimisation based on particle quality prediction in wireless sensor networks.
IET Networks, 2019

More constructions of semi-bent and plateaued functions in polynomial forms.
Clust. Comput., 2019

Hypergraph Matching With an Entropy Barrier Function.
IEEE Access, 2019

A Method for Reducing the Drag of the Ship Shaped Wall by Using Piezoelectric Ceramic Vibrators.
IEEE Access, 2019

Modeling and Experimental Study on the Micro-Vibration Transmission of a Control Moment Gyro.
IEEE Access, 2019

Latent error prediction and fault localization for microservice applications by learning from system trace logs.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

FinExpert: domain-specific test generation for FinTech systems.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

Root Cause Localization for Unreproducible Builds via Causality Analysis Over System Call Tracing.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Neural detection of semantic code clones via tree-based convolution.
Proceedings of the 27th International Conference on Program Comprehension, 2019

A Control Strategy for Active Disturbance Rejection Control Based on Marine Current Turbine.
Proceedings of the IECON 2019, 2019

An Exploratory Study of Logging Configuration Practice in Java.
Proceedings of the 2019 IEEE International Conference on Software Maintenance and Evolution, 2019

Detecting somatic mutations with high accuracy in plasma cell-free DNA with TNER2.
Proceedings of the 2019 IEEE International Conference on Bioinformatics and Biomedicine, 2019

Quality Assessment for Large-Scale Industrial Software Systems: Experience Report at Alibaba.
Proceedings of the 26th Asia-Pacific Software Engineering Conference, 2019

Effect of the Guiding Wing Height on Energy Harvesters.
Proceedings of the IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2019

2018
Introduction to the Special Issue on Emerging Software Technologies for Internet-Based Systems: Internetware and DevOps.
ACM Trans. Internet Techn., 2018

DOA Estimation for Coprime Linear Array Based on MI-ESPRIT and Lookup Table.
Sensors, 2018

Inshore Ship Detection Based on Level Set Method and Visual Saliency for SAR Images.
Sensors, 2018

The Simplified REV Method Combined with Hadamard Group Division for Phased Array Calibration.
IEICE Trans. Commun., 2018

A characterization of balanced Boolean functions with optimal algebraic immunity.
Discret. Appl. Math., 2018

TNER: a novel background error suppression method for mutation detection in circulating tumor DNA.
BMC Bioinform., 2018

Experimental Study on Fine Titanium Wire Drawing with Two Ultrasonically Oscillating Dies.
IEEE Access, 2018

FACTS: automated black-box testing of FinTech systems.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

Mining Android App Descriptions for Permission Requirements Recommendation.
Proceedings of the 26th IEEE International Requirements Engineering Conference, 2018

A Platform Solution of Data-Quality Improvement for Internet-of-Vehicle Services.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications, 2018

Delta debugging microservice systems.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

Hypergraph Matching via a Nonmonotone Newton Method.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Intelligent Software Engineering: Synergy between AI and Software Engineering.
Proceedings of the 11th Innovations in Software Engineering Conference, ISEC 2018, Hyderabad, India, February 09, 2018

Benchmarking microservice systems for software engineering research.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Telemade: A Testing Framework for Learning-Based Malware Detection Systems.
Proceedings of the Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
SafeDrive: Online Driving Anomaly Detection From Large-Scale Vehicle Data.
IEEE Trans. Ind. Informatics, 2017

Reliability Engineering.
IEEE Softw., 2017

CarStream: An Industrial System of Big Data Processing for Internet-of-Vehicles.
Proc. VLDB Endow., 2017

Impact of Prompting Agents on Task Completion in the Virtual World.
Int. J. Online Eng., 2017

When program analysis meets mobile security: an industrial study of misusing Android internet sockets.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

Arm movements effect on grasping force prediction using surface electromyography signals.
Proceedings of the 2017 IEEE International Conference on Robotics and Biomimetics, 2017

A multistage collaborative filtering method for fall detection.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

Comparative Research of the Source Localization and Connectivity Based on LORETA and WMNE Algorithm.
Proceedings of the 2017 International Conference on Machine Learning and Soft Computing, 2017

A Vibro-tactile Stimulation and Vibro-signature Synchronization Device for SSSEP-Based Study.
Proceedings of the Intelligent Robotics and Applications - 10th International Conference, 2017

New Word Detection in Ancient Chinese Literature.
Proceedings of the Web and Big Data - First International Joint Conference, 2017

2016
A provably secure non-iterative hash function resisting birthday attack.
Theor. Comput. Sci., 2016

A semantically secure public key cryptoscheme using bit-pair shadows.
Theor. Comput. Sci., 2016

Design and Fabrication of a Skew-Typed Longitudinal-Torsional Composite Ultrasonic Vibrator for Titanium Wire Drawing.
IEEE Access, 2016

Learning for test prioritization: an industrial case study.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

The correlation analysis of muscle fatigue degree of flexor carpi radialis and mechanomyographic frequency-domain features.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

A method of tongue image segmentation based on kernel FCM.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

2015
Guest editorial: special section on mining software repositories.
Empir. Softw. Eng., 2015

Program-input generation for testing database applications using existing database states.
Autom. Softw. Eng., 2015

Cell Index Database (CELLX): A Web Tool for Cancer Precision Medicine.
Proceedings of the Biocomputing 2015: Proceedings of the Pacific Symposium, 2015

Long-term paired sensory stimulation training for improved motor imagery BCI performance via pavlovian conditioning theory.
Proceedings of the 7th International IEEE/EMBS Conference on Neural Engineering, 2015

A Study of Flexible Energy-Saving Joint for Biped Robots Considering Sagittal Plane Motion.
Proceedings of the Intelligent Robotics and Applications - 8th International Conference, 2015

Crawling Motion Planning of Robots in the Multi-Rows Pipeline Structured Environment.
Proceedings of the Intelligent Robotics and Applications - 8th International Conference, 2015

A New Non-Merkle-Damgård Structural Hash Function with Provable Security.
Proceedings of the Computing and Combinatorics - 21st International Conference, 2015

AutoCSD: Automatic Cloud System Deployment in Data Centers.
Proceedings of the Cloud Computing and Big Data, 2015

SIRF-1: Enhancing Reliability of Single Flash SSD through Internal Mirroring for Mission-Critical Mobile Applications.
Proceedings of the 15th IEEE/ACM International Symposium on Cluster, 2015

2014
Guided test generation for database applications via synthesized database interactions.
ACM Trans. Softw. Eng. Methodol., 2014

Fast password recovery attack: application to APOP.
J. Intell. Manuf., 2014

Fault Diagnosis of Analog Circuit Based on High-Order Cumulants and Information Fusion.
J. Electron. Test., 2014

A New Non-MDS Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack.
CoRR, 2014

Towards Enhancing Motor Imagery Based Brain-Computer Interface Performance by Integrating Speed of Imagined Movement.
Proceedings of the Intelligent Robotics and Applications - 7th International Conference, 2014

2013
Fast Collision Attack on MD5.
IACR Cryptol. ePrint Arch., 2013

A Lightweight Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack.
IACR Cryptol. ePrint Arch., 2013

Introduction to the special issue on mining software repositories.
Empir. Softw. Eng., 2013

Cryptanalyzing an image encryption scheme based on logistic map
CoRR, 2013

MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Place recognition based on Latent Dirichlet Allocation using Markov chain Monte Carlo method.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

An exoskeleton system for hand rehabilitation driven by shape memory alloy.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

Automatic test generation for mutation testing on database applications.
Proceedings of the 8th International Workshop on Automation of Software Test, 2013

Layered and Weighted Tree Matching Algorithm for Automatic Web Data Records Recognition.
Proceedings of the 2013 10th Web Information System and Application Conference, 2013

2012
Systematic Structural Testing of Firewall Policies.
IEEE Trans. Netw. Serv. Manag., 2012

First step towards automatic correction of firewall policy faults.
ACM Trans. Auton. Adapt. Syst., 2012

On the security of PPPoE network.
Secur. Commun. Networks, 2012

Breaking a novel image encryption scheme based on improved hyperchaotic sequences
CoRR, 2012

Complex dynamics of duopoly game with heterogeneous players: A further analysis of the output model.
Appl. Math. Comput., 2012

Refactoring access control policies for performance improvement.
Proceedings of the Third Joint WOSP/SIPEW International Conference on Performance Engineering, 2012

How to Break EAP-MD5.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012

Paradigm in Verification of Access Control.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Equivalent Inner Key Recovery Attack to NMAC.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

Making Garbage Collection Wear Conscious for Flash SSD.
Proceedings of the Seventh IEEE International Conference on Networking, 2012

Selection of regression system tests for security policy evolution.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

Thermal front retreivals from SAR imagery.
Proceedings of the 2012 IEEE International Geoscience and Remote Sensing Symposium, 2012

Dynamic data replication on flash SSD assisted Video-on-Demand servers.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

2011
Designing Fast and Scalable XACML Policy Evaluation Engines.
IEEE Trans. Computers, 2011

Breaking H<sup>2</sup>-MAC Using Birthday Paradox.
IACR Cryptol. ePrint Arch., 2011

On the Security of NMAC and Its Variants.
IACR Cryptol. ePrint Arch., 2011

Fast Password Recovery Attack: Application to APOP.
IACR Cryptol. ePrint Arch., 2011

Inferring causal genomic alterations in breast cancer using gene expression data.
BMC Syst. Biol., 2011

Database state generation via dynamic symbolic execution for coverage criteria.
Proceedings of the Fourth International Workshop on Testing Database Systems, 2011

Boosting random write performance for enterprise flash storage systems.
Proceedings of the IEEE 27th Symposium on Mass Storage Systems and Technologies, 2011

Mining test oracles of web search engines.
Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011

Generating program inputs for database application testing.
Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011

An Empirical Study on Evolution of API Documentation.
Proceedings of the Fundamental Approaches to Software Engineering, 2011

Analyses of impedance matching for piezoelectric energy harvester with a resistive circuit.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Model-Driven Impact Analysis of Software Product Lines.
Proceedings of the Model-Driven Domain Analysis and Software Development, 2011

2010
Policy-Based Testing.
Proceedings of the Encyclopedia of Software Engineering, 2010

Construct MD5 Collisions Using Just A Single Block Of Message.
IACR Cryptol. ePrint Arch., 2010

ACPT: A Tool for Modeling and Verifying Access Control Policies.
Proceedings of the POLICY 2010, 2010

Identifying security bug reports via text mining: An industrial case study.
Proceedings of the 7th International Working Conference on Mining Software Repositories, 2010

Random unit-test generation with MUT-aware sequence recommendation.
Proceedings of the ASE 2010, 2010

Text mining in supporting software systems risk assurance.
Proceedings of the ASE 2010, 2010

Gulf stream thermal fronts detected by synthetic aperture radar.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2010

The Research of CR-based WSNs Architecture.
Proceedings of the International Conference on E-Business and E-Government, 2010

The HiBench benchmark suite: Characterization of the MapReduce-based data analysis.
Proceedings of the Workshops Proceedings of the 26th International Conference on Data Engineering, 2010

Mining Likely Properties of Access Control Policies via Association Rule Mining.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

FIRE: A File Reunion Based Data Replication Strategy for Data Grids.
Proceedings of the 10th IEEE/ACM International Conference on Cluster, 2010

2009
How To Find Weak Input Differences For MD5 Collision Attacks.
IACR Cryptol. ePrint Arch., 2009

Detection of Multiple-Duty-Related Security Leakage in Access Control Policies.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

Fault Localization for Firewall Policies.
Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), 2009

Modeling and simulation on the contact deformation distributionin a wire race ball bearing.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2009

Test selection for result inspection via mining predicate rules.
Proceedings of the 31st International Conference on Software Engineering, 2009

DORA: A Dynamic File Assignment Strategy with Replication.
Proceedings of the ICPP 2009, 2009

Security policy testing via automated program code generation.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

A Novel Isotropic Scatter Distribution Wideband MIMO M2M Fading Channel Model.
Proceedings of the 7th Annual Conference on Communication Networks and Services Research, 2009

2008
MICRO: A Multilevel Caching-Based Reconstruction Optimization for Mobile Storage Systems.
IEEE Trans. Computers, 2008

Could The 1-MSB Input Difference Be The Fastest Collision Attack For MD5 ?
IACR Cryptol. ePrint Arch., 2008

A New Collision Differential For MD5 With Its Full Differential Path.
IACR Cryptol. ePrint Arch., 2008

Xengine: a fast and scalable XACML policy evaluation engine.
Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2008

Improving Structural Testing of Object-Oriented Programs via Integrating Evolutionary Testing and Symbolic Execution.
Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering (ASE 2008), 2008

Workshop on testing, analysis and verification of web software (TAV-WEB 2008).
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2008

Automated Generation of Pointcut Mutants for Testing Pointcuts in AspectJ Programs.
Proceedings of the 19th International Symposium on Software Reliability Engineering (ISSRE 2008), 2008

A static data placement strategy towards perfect load-balancing for distributed storage clusters.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

SAIL: Self-Adaptive File Reallocation on Hybrid Disk Arrays.
Proceedings of the High Performance Computing, 2008

Assessing Quality of Policy Properties in Verification of Access Control Policies.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
A fault model and mutation testing of access control policies.
Proceedings of the 16th International Conference on World Wide Web, 2007

Evacon: a framework for integrating evolutionary and concolic testing for object-oriented programs.
Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2007), 2007

A framework and tool supports for testing modularity of software design.
Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2007), 2007

Automated Testing and Response Analysis ofWeb Services.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Automated Test Generation for Access Control Policies via Change-Impact Analysis.
Proceedings of the Third International Workshop on Software Engineering for Secure Systems, 2007

WebSob: A Tool for Robustness Testing of Web Services.
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007

Automated Inference of Pointcuts in Aspect-Oriented Refactoring.
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007

Conformance Checking of Access Control Policies Specified in XACML.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

2006
Clamp: automated joinpoint clustering and pointcut mining in aspect-oriented refactoring.
ACM SIGSOFT Softw. Eng. Notes, 2006

Inferring Access-Control Policy Properties via Machine Learning.
Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 2006

APTE: automated pointcut testing for AspectJ programs.
Proceedings of the 2nd Workshop on Testing Aspect-Oriented Programs, 2006

Substra: A Framework for Automatic Generation of Integration Tests.
Proceedings of the 2006 International Workshop on Automation of Software Test, 2006

Automatic extraction of abstract-object-state machines from unit-test executions.
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006

Understanding software application interfaces via string analysis.
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006

Defining and Measuring Policy Coverage in Testing Access Control Policies.
Proceedings of the Information and Communications Security, 8th International Conference, 2006

2005
Helping users avoid bugs in GUI applications.
Proceedings of the 27th International Conference on Software Engineering (ICSE 2005), 2005


  Loading...