Ya Xiao

Orcid: 0000-0003-2124-6635

According to our database1, Ya Xiao authored at least 44 papers between 2018 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Measurement of Embedding Choices on Cryptographic API Completion Tasks.
ACM Trans. Softw. Eng. Methodol., March, 2024

Intangible rewards versus tangible rewards in gamified online learning: Which promotes student intrinsic motivation, behavioural engagement, cognitive engagement and learning performance?
Br. J. Educ. Technol., January, 2024

2023
Specializing Neural Networks for Cryptographic Code Completion Applications.
IEEE Trans. Software Eng., June, 2023

Dynamic Modelling and Numerical Simulation of Formation Control for Intelligent Multi-agent System with Target Geometric Configuration.
Appl. Math. Comput., May, 2023

Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks.
IEEE Trans. Software Eng., February, 2023

Automatic Detection of Java Cryptographic API Misuses: Are We There Yet?
IEEE Trans. Software Eng., 2023

Crypto-ransomware Detection through Quantitative API-based Behavioral Profiling.
CoRR, 2023

Improving Visual-Semantic Embedding with Adaptive Pooling and Optimization Objective.
Proceedings of the 17th Conference of the European Chapter of the Association for Computational Linguistics, 2023

2022
Genome Assembly and Population Resequencing Reveal the Geographical Divergence of Shanmei (<i>Rubus corchorifolius</i>).
Genom. Proteom. Bioinform., December, 2022

Accurately quantifying the superposition state of two different Laguerre-Gaussian modes with single intensity distribution measurement.
Quantum Inf. Process., 2022

Being the Developers' Friend: Our Experience Developing a High-Precision Tool for Secure Coding.
IEEE Secur. Priv., 2022

Deep Learning-based Anomaly Detection in Cyber-physical Systems: Progress and Opportunities.
ACM Comput. Surv., 2022

Privacy Guarantees of Bluetooth Low Energy Contact Tracing: A Case Study on COVIDWISE.
Computer, 2022

Industrial Strength Static Detection for Cryptographic API Misuses.
Proceedings of the IEEE Secure Development Conference, 2022

Example-based vulnerability detection and repair in Java code.
Proceedings of the 30th IEEE/ACM International Conference on Program Comprehension, 2022

Poster: Comprehensive Comparisons of Embedding Approaches for Cryptographic API Completion.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2022

Privacy Guarantees of BLE Contact Tracing for COVID-19 and Beyond: A Case Study on COVIDWISE.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Sharing quantum steering among multiple Alices and Bobs via a two-qubit Werner state.
Quantum Inf. Process., 2021

Heterogeneous identity trust management method based on risk assessment.
J. Intell. Fuzzy Syst., 2021

Privacy Guarantees of BLE Contact Tracing: A Case Study on COVIDWISE.
CoRR, 2021

Embedding Code Contexts for Cryptographic API Suggestion: New Methodologies and Comparisons.
CoRR, 2021

Data-Driven Vulnerability Detection and Repair in Java Code.
CoRR, 2021

Multi-location cryptographic code repair with neural-network-based methodologies.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

Yunnan University at VQA-Med 2021: Pretrained BioBERT for Medical Domain Visual Question Answering.
Proceedings of the Working Notes of CLEF 2021 - Conference and Labs of the Evaluation Forum, Bucharest, Romania, September 21st - to, 2021

2020
Heterogeneous Identity Expression and Association Method Based on Attribute Aggregation "In Prepress".
J. Web Eng., 2020

Industrial Experience of Finding Cryptographic Vulnerabilities in Large-scale Codebases.
CoRR, 2020

Tutorial: Principles and Practices of Secure Cryptographic Coding in Java.
Proceedings of the IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, 2020

Deployment-quality and Accessible Solutions for Cryptography Code Development.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

Methodologies for Quantifying (Re-)randomization Security and Timing under JIT-ROP.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Joint Entity and Relation Extraction with a Hybrid Transformer and Reinforcement Learning Based Model.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
An improved network security situation assessment approach in software defined networks.
Peer-to-Peer Netw. Appl., 2019

Discovery method for distributed denial-of-service attack behavior in SDNs using a feature-pattern graph model.
Frontiers Inf. Technol. Electron. Eng., 2019

The Moderation Examination of ICT Use on the Association Between Chinese Mainland Students' Socioeconomic Status and Reading Achievement.
Int. J. Emerg. Technol. Learn., 2019

Decentralized attribute-based conjunctive keyword search scheme with online/offline encryption and outsource decryption for cloud computing.
Future Gener. Comput. Syst., 2019

Measuring Attack Surface Reduction in the Presence of Code (Re-)Randomization.
CoRR, 2019

Sense-Based Topic Word Embedding Model for Item Recommendation.
IEEE Access, 2019

Comparative Measurement of Cache Configurations' Impacts on Cache Timing Side-Channel Attacks.
Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test, 2019

The influence of ICT attitudes on closing the reading literacy gap of students from different economic, social and cultural backgrounds.
Proceedings of the 14th International Conference on Computer Science & Education, 2019

Neural Cryptanalysis: Metrics, Methodology, and Applications in CPS Ciphers.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Poster: Deployment-quality and Accessible Solutions for Cryptography Code Development.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.
Sensors, 2018

CHIRON: Deployment-quality Detection of Java Cryptographic Vulnerabilities.
CoRR, 2018

Secure Multi-Authority Data Access Control Scheme in Cloud Storage System Based on Attribute-Based Signcryption.
IEEE Access, 2018


  Loading...