Xinyun Chen

Orcid: 0000-0001-8379-902X

According to our database1, Xinyun Chen authored at least 92 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Vulnerability Detection with Code Language Models: How Far Are We?
CoRR, 2024

A Human-Inspired Reading Agent with Gist Memory of Very Long Contexts.
CoRR, 2024

Transformers Can Achieve Length Generalization But Not Robustly.
CoRR, 2024

Premise Order Matters in Reasoning with Large Language Models.
CoRR, 2024

Self-Discover: Large Language Models Self-Compose Reasoning Structures.
CoRR, 2024

2023
Unsupervised Adaptive Bipartite Graph Embedding.
IEEE Trans. Knowl. Data Eng., October, 2023

Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses.
IEEE Trans. Pattern Anal. Mach. Intell., 2023

Chain of Code: Reasoning with a Language Model-Augmented Code Emulator.
CoRR, 2023

Universal Self-Consistency for Large Language Model Generation.
CoRR, 2023

Steady-State Analysis and Online Learning for Queues with Hawkes Arrivals.
CoRR, 2023

Large Language Models can Learn Rules.
CoRR, 2023

Take a Step Back: Evoking Reasoning via Abstraction in Large Language Models.
CoRR, 2023

Large Language Models Cannot Self-Correct Reasoning Yet.
CoRR, 2023

Large Language Models as Analogical Reasoners.
CoRR, 2023

Large Language Models as Optimizers.
CoRR, 2023

BioCoder: A Benchmark for Bioinformatics Code Generation with Contextual Pragmatic Knowledge.
CoRR, 2023

Large Language Models as Tool Makers.
CoRR, 2023

Flan-MoE: Scaling Instruction-Finetuned Language Models with Sparse Mixture of Experts.
CoRR, 2023

Teaching Large Language Models to Self-Debug.
CoRR, 2023

DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection.
CoRR, 2023

Larger language models do in-context learning differently.
CoRR, 2023

Online Learning and Optimization for Queues with Unknown Demand Curve and Service Distribution.
CoRR, 2023

DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Large Language Models Can Be Easily Distracted by Irrelevant Context.
Proceedings of the International Conference on Machine Learning, 2023

Compositional Semantic Parsing with Large Language Models.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Symbol tuning improves in-context learning in language models.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

AISec '23: 16th ACM Workshop on Artificial Intelligence and Security.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Re-appraising the Schema Linking for Text-to-SQL.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023

2022
Learning-Based Program Synthesis: Towards Synthesizing Complex Programs from Multi-Modal Specifications in the Wild
PhD thesis, 2022

Editorial introduction to the special issue "Masakiyo Miyazawa - 75".
Queueing Syst. Theory Appl., 2022

Data-pooling Reinforcement Learning for Personalized Healthcare Intervention.
CoRR, 2022

Scaling Instruction-Finetuned Language Models.
CoRR, 2022

Competition-Level Code Generation with AlphaCode.
CoRR, 2022

Tail Quantile Estimation for Non-Preemptive Priority Queues.
Proceedings of the Winter Simulation Conference, 2022

Perturbation type categorization for multiple adversarial perturbation robustness.
Proceedings of the Uncertainty in Artificial Intelligence, 2022

Measuring and Improving Compositional Generalization in Text-to-SQL via Component Alignment.
Proceedings of the Findings of the Association for Computational Linguistics: NAACL 2022, 2022

SMORE: Knowledge Graph Completion and Multi-hop Reasoning in Massive Knowledge Graphs.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

Benchmarking Language Models for Code Syntax Understanding.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022

AISec '22: 15th ACM Workshop on Artificial Intelligence and Security.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Learning Bounded Context-Free-Grammar via LSTM and the Transformer: Difference and the Explanations.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
RobustART: Benchmarking Robustness on Architecture Design and Training Techniques.
CoRR, 2021

A Note on General Statistics of Publicly Accessible Knowledge Bases.
CoRR, 2021

Understanding the Spread of COVID-19 Epidemic: A Spatio-Temporal Point Process View.
CoRR, 2021

A High-Fidelity, Machine-Learning Enhanced Queueing Network Simulation Model For Hospital Ultrasound Operations.
Proceedings of the Winter Simulation Conference, 2021

Latent Execution for Neural Program Synthesis Beyond Domain-Specific Languages.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

ADVM'21: 1st International Workshop on Adversarial Learning for Multimedia.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

LEGO: Latent Execution-Guided Reasoning for Multi-Hop Question Answering on Knowledge Graphs.
Proceedings of the 38th International Conference on Machine Learning, 2021

Learn-to-Share: A Hardware-friendly Transfer Learning Framework Exploiting Computation and Parameter Sharing.
Proceedings of the 38th International Conference on Machine Learning, 2021

SpreadsheetCoder: Formula Prediction from Semi-structured Context.
Proceedings of the 38th International Conference on Machine Learning, 2021

Natural SQL: Making SQL Easier to Infer from Natural Language Specifications.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2021, 2021

Exploring Underexplored Limitations of Cross-Domain Text-to-SQL Generalization.
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021

REFIT: A Unified Watermark Removal Framework For Deep Learning Systems With Limited Data.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Understanding Robustness in Teacher-Student Setting: A New Perspective.
Proceedings of the 24th International Conference on Artificial Intelligence and Statistics, 2021

Towards Robustness of Text-to-SQL Models against Synonym Substitution.
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021

PlotCoder: Hierarchical Decoding for Synthesizing Visualization Code in Programmatic Context.
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021

2020
An Anonymous and Efficient ECC-Based Authentication Scheme for SIP.
Wirel. Commun. Mob. Comput., 2020

Privacy-Preserving Multidimensional Data Aggregation Scheme for Smart Grid.
Secur. Commun. Networks, 2020

Rates of Convergence to Stationarity for Reflected Brownian Motion.
Math. Oper. Res., 2020

Towards Defending Multiple Adversarial Perturbations via Gated Batch Normalization.
CoRR, 2020

Adversarial Attacks for Embodied Agents.
CoRR, 2020

Perfect Sampling of Multivariate Hawkes Processes.
Proceedings of the Winter Simulation Conference, 2020

Synthesize, Execute and Debug: Learning to Repair for Neural Program Synthesis.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Compositional Generalization via Neural-Symbolic Stack Machines.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Deep Symbolic Superoptimization Without Human Knowledge.
Proceedings of the 8th International Conference on Learning Representations, 2020

Infinite-horizon Off-Policy Policy Evaluation with Multiple Behavior Policies.
Proceedings of the 8th International Conference on Learning Representations, 2020

Neural Symbolic Reader: Scalable Integration of Distributed and Symbolic Representations for Reading Comprehension.
Proceedings of the 8th International Conference on Learning Representations, 2020

Spatiotemporal Attacks for Embodied Agents.
Proceedings of the Computer Vision - ECCV 2020, 2020

2019
Perfect Sampling of Generalized Jackson Networks.
Math. Oper. Res., 2019

A Neural-based Program Decompiler.
CoRR, 2019

Coda: An End-to-End Neural Program Decompiler.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

Learning to Perform Local Rewriting for Combinatorial Optimization.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

Woodland Detection Using Most-Sure Strategy to Fuse Segmentation Results of Deep Learning.
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019

Execution-Guided Neural Program Synthesis.
Proceedings of the 7th International Conference on Learning Representations, 2019

2018
Many-server Gaussian limits for overloaded non-Markovian queues with customer abandonment.
Queueing Syst. Theory Appl., 2018

Learning to Progressively Plan.
CoRR, 2018

Tree-to-tree Neural Networks for Program Translation.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018

Towards Synthesizing Complex Programs From Input-Output Examples.
Proceedings of the 6th International Conference on Learning Representations, 2018

Fooling Vision and Language Models Despite Localization and Attention Mechanism.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018

2017
Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning.
CoRR, 2017

Can you fool AI with adversarial examples on a visual Turing test?
CoRR, 2017

Adversarial Example Defenses: Ensembles of Weak Defenses are not Strong.
CoRR, 2017

Learning Neural Programs To Parse Programs.
CoRR, 2017

Adversarial Example Defense: Ensembles of Weak Defenses are not Strong.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

Delving into Transferable Adversarial Examples and Black-box Attacks.
Proceedings of the 5th International Conference on Learning Representations, 2017

2016
A General Retraining Framework for Scalable Adversarial Classification.
CoRR, 2016

Latent Attention For If-Then Program Synthesis.
Proceedings of the Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, 2016

2014
Exact gradient simulation for stochastic fluid networks in steady state.
Proceedings of the 2014 Winter Simulation Conference, 2014

ICA image feature extraction for improving diagnosis of Alzheimer's disease and mild cognitive impairment.
Proceedings of the 10th International Conference on Natural Computation, 2014

2012
Comparison of the Methods for Converting Traditional Credit Rating into the Initial Credit Score in Electronic Commerce.
Proceedings of the 11th Wuhan International Conference on E-Business, 2012

2011
ICA-Based Automatic Classification of PET Images from ADNI Database.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

ICA-based classification of MCI vs HC.
Proceedings of the Seventh International Conference on Natural Computation, 2011

2010
ICA-Based Automatic Classification of Magnetic Resonance Images from ADNI Data.
Proceedings of the Life System Modeling and Intelligent Computing, 2010


  Loading...