Xiaofei Xie

Orcid: 0000-0002-1288-6502

Affiliations:
  • Nanyang Technological University, Singapore


According to our database1, Xiaofei Xie authored at least 155 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
CMD: Co-Analyzed IoT Malware Detection and Forensics via Network and Hardware Domains.
IEEE Trans. Mob. Comput., May, 2024

DDoS family: A novel perspective for massive types of DDoS attacks.
Comput. Secur., March, 2024

KAPE: <i>k</i>NN-based Performance Testing for Deep Code Search.
ACM Trans. Softw. Eng. Methodol., February, 2024

Seed Selection for Testing Deep Neural Networks.
ACM Trans. Softw. Eng. Methodol., January, 2024

Faire: Repairing Fairness of Neural Networks via Neuron Condition Synthesis.
ACM Trans. Softw. Eng. Methodol., January, 2024

LaF: Labeling-free Model Selection for Automated Deep Neural Network Reusing.
ACM Trans. Softw. Eng. Methodol., January, 2024

MIP: CLIP-based Image Reconstruction from PEFT Gradients.
CoRR, 2024

ContrastRepair: Enhancing Conversation-Based Automated Program Repair via Contrastive Test Case Pairs.
CoRR, 2024

Evaluating Decision Optimality of Autonomous Driving via Metamorphic Testing.
CoRR, 2024

Importance Guided Data Augmentation for Neural-Based Code Understanding.
CoRR, 2024

SpecGen: Automated Generation of Formal Program Specifications via Large Language Models.
CoRR, 2024

Exploring the Potential of ChatGPT in Automated Code Refinement: An Empirical Study.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

2023
Automated Question Title Reformulation by Mining Modification Logs From Stack Overflow.
IEEE Trans. Software Eng., September, 2023

GraphSearchNet: Enhancing GNNs via Capturing Global Dependencies for Semantic Code Search.
IEEE Trans. Software Eng., April, 2023

Demystifying Performance Regressions in String Solvers.
IEEE Trans. Software Eng., March, 2023

MaLTeSQuE 2022 Workshop Summary.
ACM SIGSOFT Softw. Eng. Notes, January, 2023

Neuron Coverage-Guided Domain Generalization.
IEEE Trans. Pattern Anal. Mach. Intell., 2023

A Mutation-Based Method for Multi-Modal Jailbreaking Attack Detection.
CoRR, 2023

AdaptiveFL: Adaptive Heterogeneous Federated Learning for Resource-Constrained AIoT Systems.
CoRR, 2023

Have Your Cake and Eat It Too: Toward Efficient and Accurate Split Federated Learning.
CoRR, 2023

A Comprehensive Study of Governance Issues in Decentralized Finance Applications.
CoRR, 2023

Bias Assessment and Mitigation in LLM-based Code Generation.
CoRR, 2023

When GPT Meets Program Analysis: Towards Intelligent Detection of Smart Contract Logic Vulnerabilities in GPTScan.
CoRR, 2023

Evaluating the Robustness of Test Selection Methods for Deep Neural Networks.
CoRR, 2023

Understanding Large Language Model Based Fuzz Driver Generation.
CoRR, 2023

BehAVExplor: Behavior Diversity Guided Testing for Autonomous Driving Systems.
CoRR, 2023

Active Code Learning: Benchmarking Sample-Efficient Training of Code Models.
CoRR, 2023

RNNS: Representation Nearest Neighbor Search Black-Box Attack on Code Models.
CoRR, 2023

Evaluating AIGC Detectors on Code Content.
CoRR, 2023

Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation.
Proceedings of the 32nd USENIX Security Symposium, 2023

Decompiling x86 Deep Neural Network Executables.
Proceedings of the 32nd USENIX Security Symposium, 2023

DistXplore: Distribution-Guided Testing for Evaluating and Enhancing Deep Learning Systems.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

EndWatch: A Practical Method for Detecting Non-Termination in Real-World Software.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Generative Model-Based Testing on Decision-Making Policies.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

BehAVExplor: Behavior Diversity Guided Testing for Autonomous Driving Systems.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

GameRTS: A Regression Testing Framework for Video Games.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Widget Detection-based Testing for Industrial Mobile Games.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2023

ContraBERT: Enhancing Code Pre-trained Models via Contrastive Learning.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

CodeS: Towards Code Model Generalization Under Distribution Shift.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: New Ideas and Emerging Results, 2023

Aries: Efficient Testing of Deep Neural Networks via Labeling-Free Accuracy Estimation.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Neural Episodic Control with State Abstraction.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

SeqAdver: Automatic Payload Construction and Injection in Sequence-based Android Adversarial Attack.
Proceedings of the IEEE International Conference on Data Mining, 2023

A Black-Box Attack on Code Models via Representation Nearest Neighbor Search.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023

Evading DeepFake Detectors via Adversarial Statistical Consistency.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Towards Understanding Model Quantization for Reliable Deep Neural Network Deployment.
Proceedings of the 2nd IEEE/ACM International Conference on AI Engineering, 2023

Mitigating Membership Inference Attacks via Weighted Smoothing.
Proceedings of the Annual Computer Security Applications Conference, 2023

Multi-target Backdoor Attacks for Code Pre-trained Models.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

2022
DeepRepair: Style-Guided Repairing for Deep Neural Networks in the Real-World Operational Environment.
IEEE Trans. Reliab., 2022

NPC: Neuron Path Coverage via Characterizing Decision Logic of Deep Neural Networks.
ACM Trans. Softw. Eng. Methodol., 2022

An Empirical Study on Data Distribution-Aware Test Selection for Deep Learning Enhancement.
ACM Trans. Softw. Eng. Methodol., 2022

Breaking Neural Reasoning Architectures With Metamorphic Relation-Based Adversarial Examples.
IEEE Trans. Neural Networks Learn. Syst., 2022

Neighborhood Cooperative Multiagent Reinforcement Learning for Adaptive Traffic Signal Control in Epidemic Regions.
IEEE Trans. Intell. Transp. Syst., 2022

JSCSP: A Novel Policy-Based XSS Defense Mechanism for Browsers.
IEEE Trans. Dependable Secur. Comput., 2022

Byzantine-Resilient Decentralized Stochastic Gradient Descent.
IEEE Trans. Circuits Syst. Video Technol., 2022

GBGallery : A benchmark and framework for game testing.
Empir. Softw. Eng., 2022

Is Self-Attention Powerful to Learn Code Syntax and Semantics?
CoRR, 2022

Efficient Testing of Deep Neural Networks via Decision Boundary Analysis.
CoRR, 2022

Enhancing Security Patch Identification by Capturing Structures in Commits.
CoRR, 2022

CodeS: A Distribution Shift Benchmark Dataset for Source Code Learning.
CoRR, 2022

Characterizing and Understanding the Behavior of Quantized Models for Reliable Deployment.
CoRR, 2022

Labeling-Free Comparison Testing of Deep Learning Models.
CoRR, 2022

Unveiling Project-Specific Bias in Neural Code Models.
CoRR, 2022

Learning Program Semantics with Code Representations: An Empirical Study.
Proceedings of the IEEE International Conference on Software Analysis, 2022

Large-scale analysis of non-termination bugs in real-world OSS projects.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

GraphCode2Vec: Generic Code Embedding via Lexical and Program Dependence Analyses.
Proceedings of the 19th IEEE/ACM International Conference on Mining Software Repositories, 2022

A<sup>3</sup>GAN: Attribute-Aware Anonymization Networks for Face De-identification.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Towards Understanding the Faults of JavaScript-Based Deep Learning Systems.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

TransRepair: Context-aware Program Repair for Compilation Errors.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Cross-lingual transfer learning for statistical type inference.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

2021
Independent Reinforcement Learning for Weakly Cooperative Multiagent Traffic Control Problem.
IEEE Trans. Veh. Technol., 2021

A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices.
IEEE Trans. Inf. Forensics Secur., 2021

Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis.
IEEE Trans. Inf. Forensics Secur., 2021

Text Backdoor Detection Using an Interpretable RNN Abstract Model.
IEEE Trans. Inf. Forensics Secur., 2021

Understanding adversarial robustness via critical attacking route.
Inf. Sci., 2021

GraphSearchNet: Enhancing GNNs via Capturing Global Dependency for Semantic Code Search.
CoRR, 2021

Cross-Lingual Adaptation for Type Inference.
CoRR, 2021

Inferring Loop Invariants for Multi-Path Loops.
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2021

An empirical study of GUI widget detection for industrial mobile games.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

A First Look at the Effect of Deep Learning in Coverage-guided Fuzzing.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

Towards Exploring the Limitations of Active Learning: An Empirical Study.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

Vall-nut: Principled Anti-Grey box - Fuzzing.
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021

AVA: Adversarial Vignetting Attack against Visual Recognition.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Automatic Web Testing Using Curiosity-Driven Reinforcement Learning.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

RNNRepair: Automatic RNN Repair via Model-based Analysis.
Proceedings of the 38th International Conference on Machine Learning, 2021

Bias Field Poses a Threat to DNN-Based X-Ray Recognition.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

Retrieval-Augmented Generation for Code Summarization via Hybrid GNN.
Proceedings of the 9th International Conference on Learning Representations, 2021

Learning to Adversarially Blur Visual Object Tracking.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

SoFi: Reflection-Augmented Fuzzing for JavaScript Engines.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Research and Design of Big Data Relevance Analysis System for Land Development Industry Chain.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

Stealing Deep Reinforcement Learning Models for Fun and Profit.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Decision-Guided Weighted Automata Extraction from Recurrent Neural Networks.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

EfficientDeRain: Learning Pixel-wise Dilation Filtering for High-Efficiency Single-Image Deraining.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
DeepRepair: Style-Guided Repairing for DNNs in the Real-world Operational Environment.
CoRR, 2020

EfficientDeRain: Learning Pixel-wise Dilation Filtering for High-Efficiency Single-Image Deraining.
CoRR, 2020

Adversarial Exposure Attack on Diabetic Retinopathy Imagery.
CoRR, 2020

FakeRetouch: Evading DeepFakes Detection via the Guidance of Deliberate Noise.
CoRR, 2020

It's Raining Cats or Dogs? Adversarial Rain Attack on DNN Perception.
CoRR, 2020

Light Can Hack Your Face! Black-box Backdoor Attack on Face Recognition Systems.
CoRR, 2020

Pasadena: Perceptually Aware and Stealthy Adversarial Denoise Attack.
CoRR, 2020

Generating Adversarial Examples withControllable Non-transferability.
CoRR, 2020

Automatic Code Summarization via Multi-dimensional Semantic Fusing in GNN.
CoRR, 2020

Stealing Deep Reinforcement Learning Models for Fun and Profit.
CoRR, 2020

ABBA: Saliency-Regularized Motion-Based Adversarial Blur Attack.
CoRR, 2020

FakeLocator: Robust Localization of GAN-Based Face Manipulations via Semantic Segmentation Networks with Bells and Whistles.
CoRR, 2020

An Empirical Study in Software Verification Tools.
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2020

Watch out! Motion is Blurring the Vision of Your Deep Neural Networks.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

DeepSonar: Towards Effective and Robust Detection of AI-Synthesized Fake Voices.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

Amora: Black-box Adversarial Morphing Attack.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

DeepRhythm: Exposing DeepFakes with Attentional Visual Heartbeat Rhythms.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

FakePolisher: Making DeepFakes More Detection-Evasive by Shallow Reconstruction.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

SADT: Syntax-Aware Differential Testing of Certificate Validation in SSL/TLS Implementations.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Audee: Automated Testing for Deep Learning Frameworks.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Marble: Model-based Robustness Analysis of Stateful Deep Learning Systems.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Cats Are Not Fish: Deep Learning Testing Calls for Out-Of-Distribution Awareness.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

How are Deep Learning Models Similar?: An Empirical Study on Clone Analysis of Deep Learning Software.
Proceedings of the ICPC '20: 28th International Conference on Program Comprehension, 2020

FakeSpotter: A Simple yet Robust Baseline for Spotting AI-Synthesized Fake Faces.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Regression Testing of Massively Multiplayer Online Role-Playing Games.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2020

Towards characterizing adversarial defects of deep learning software from the lens of uncertainty.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

MemLock: memory usage guided fuzzing.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Typestate-guided fuzzer for discovering use-after-free vulnerabilities.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

SPARK: Spatial-Aware Online Incremental Attack Against Visual Tracking.
Proceedings of the Computer Vision - ECCV 2020, 2020

An Empirical Study on Robustness of DNNs with Out-of-Distribution Awareness.
Proceedings of the 27th Asia-Pacific Software Engineering Conference, 2020

Stealthy and Efficient Adversarial Attacks against Deep Reinforcement Learning.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Automatic Loop Summarization via Path Dependency Analysis.
IEEE Trans. Software Eng., 2019

Amora: Black-box Adversarial Morphing Attack.
CoRR, 2019

Spatial-aware Online Adversarial Perturbations Against Visual Object Tracking.
CoRR, 2019

FakeSpotter: A Simple Baseline for Spotting AI-Synthesized Fake Faces.
CoRR, 2019

A Co-Occurrence Recommendation Model of Software Security Requirement.
Proceedings of the 2019 International Symposium on Theoretical Aspects of Software Engineering, 2019

Locating vulnerabilities in binaries via memory layout recovering.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

Cerebro: context-aware adaptive fuzzing for effective vulnerability detection.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

DeepStellar: model-based quantitative analysis of stateful deep learning systems.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

Wuji: Automatic Online Combat Game Testing Using Evolutionary Deep Reinforcement Learning.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Coverage-Guided Fuzzing for Feedforward Neural Networks.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

DeepMutation++: A Mutation Testing Framework for Deep Learning Systems.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

An Empirical Study Towards Characterizing Deep Learning Development and Deployment Across Different Frameworks and Platforms.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

A Quantitative Analysis Framework for Recurrent Neural Network.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

DeepHunter: a coverage-guided fuzz testing framework for deep neural networks.
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019

Cross-project Defect Prediction via ASTToken2Vec and BLSTM-based Neural Network.
Proceedings of the International Joint Conference on Neural Networks, 2019

DiffChaser: Detecting Disagreements for Deep Neural Networks.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Learning Performance Optimization from Code Changes for Android Apps.
Proceedings of the 2019 IEEE International Conference on Software Testing, 2019

Safe Inputs Approximation for Black-Box Systems.
Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, 2019

MobiDroid: A Performance-Sensitive Malware Detection System on Mobile Platform.
Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, 2019

2018
DeepCruiser: Automated Guided Testing for Stateful Deep Learning Systems.
CoRR, 2018

An Orchestrated Empirical Study on Deep Learning Frameworks and Platforms.
CoRR, 2018

Metamorphic Relation Based Adversarial Attacks on Differentiable Neural Computer.
CoRR, 2018

Coverage-Guided Fuzzing for Deep Neural Networks.
CoRR, 2018

Hawkeye: Towards a Desired Directed Grey-box Fuzzer.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Loopster: static loop termination analysis.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

FESR: A Framework for Eliciting Security Requirements Based on Integration of Common Criteria and Weakness Detection Formal Model.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

2016
Termination of Monotone Programs.
CoRR, 2016

Proteus: computing disjunctive loop summary via path dependency analysis.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

Static loop analysis and its applications.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

2015
S-looper: automatic summarization for multipath string loops.
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015

2014
Automatic Verification for Later-Correspondence of Security Protocols.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2014

2006
Temporal Correlation Based Speech Feature Processing and its Application to Speaker Recognition.
Proceedings of the IEEE International Conference on Systems, 2006


  Loading...