Xiaofei Xie
Xiaofei Xie
Nanyang Technological University
Verified email at tju.edu.cn - Homepage
Title
Cited by
Cited by
Year
Deephunter: A coverage-guided fuzz testing framework for deep neural networks
X Xie, L Ma, F Juefei-Xu, M Xue, H Chen, Y Liu, J Zhao, B Li, J Yin, S See
Proceedings of the 28th ACM SIGSOFT International Symposium on Software …, 2019
96*2019
Hawkeye: Towards a desired directed grey-box fuzzer
H Chen, Y Xue, Y Li, B Chen, X Xie, X Wu, Y Liu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
592018
Deepstellar: Model-based quantitative analysis of stateful deep learning systems
X Du, X Xie, Y Li, L Ma, Y Liu, J Zhao
Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019
51*2019
Proteus: Computing disjunctive loop summary via path dependency analysis
X Xie, B Chen, Y Liu, W Le, X Li
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
312016
S-looper: automatic summarization for multipath string loops
X Xie, Y Liu, W Le, X Li, H Chen
Proceedings of the 2015 International Symposium on Software Testing and …, 2015
312015
DiffChaser: Detecting Disagreements for Deep Neural Networks.
X Xie, L Ma, H Wang, Y Li, Y Liu, X Li
IJCAI, 5772-5778, 2019
302019
Fakespotter: A simple baseline for spotting ai-synthesized fake faces
R Wang, L Ma, F Juefei-Xu, X Xie, J Wang, Y Liu
arXiv preprint arXiv:1909.06122, 2019
222019
An empirical study towards characterizing deep learning development and deployment across different frameworks and platforms
Q Guo, S Chen, X Xie, L Ma, Q Hu, H Liu, Y Liu, J Zhao, X Li
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
152019
Wuji: Automatic online combat game testing using evolutionary deep reinforcement learning
Y Zheng, X Xie, T Su, L Ma, J Hao, Z Meng, Y Liu, R Shen, Y Chen, C Fan
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
132019
Amora: Black-box adversarial morphing attack
R Wang, F Juefei-Xu, Q Guo, Y Huang, X Xie, L Ma, Y Liu
Proceedings of the 28th ACM International Conference on Multimedia, 1376-1385, 2020
112020
ABBA: Saliency-Regularized Motion-Based Adversarial Blur Attack
Q Guo, F Juefei-Xu, X Xie, L Ma, J Wang, W Feng, Y Liu
arXiv preprint arXiv:2002.03500, 2020
112020
Cerebro: context-aware adaptive fuzzing for effective vulnerability detection
Y Li, Y Xue, H Chen, X Wu, C Zhang, X Xie, H Wang, Y Liu
Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019
112019
Metamorphic relation based adversarial attacks on differentiable neural computer
A Chan, L Ma, F Juefei-Xu, X Xie, Y Liu, YS Ong
arXiv preprint arXiv:1809.02444, 2018
112018
Stealthy and efficient adversarial attacks against deep reinforcement learning
J Sun, T Zhang, X Xie, L Ma, Y Zheng, K Chen, Y Liu
arXiv preprint arXiv:2005.07099, 2020
102020
SPARK: Spatial-aware online incremental attack against visual tracking
Q Guo, X Xie, F Juefei-Xu, L Ma, Z Li, W Xue, W Feng, Y Liu
arXiv preprint arXiv:1910.08681, 2019
102019
Automatic loop summarization via path dependency analysis
X Xie, B Chen, L Zou, Y Liu, W Le, X Li
IEEE Transactions on Software Engineering 45 (6), 537-557, 2017
102017
Memlock: Memory usage guided fuzzing
C Wen, H Wang, Y Li, S Qin, Y Liu, Z Xu, H Chen, X Xie, G Pu, T Liu
42nd International Conference on Software Engineering, 2020
92020
Towards characterizing adversarial defects of deep learning software from the lens of uncertainty
X Zhang, X Xie, L Ma, X Du, Q Hu, Y Liu, J Zhao, M Sun
arXiv preprint arXiv:2004.11573, 2020
92020
DeepRhythm: Exposing DeepFakes with Attentional Visual Heartbeat Rhythms
H Qi, Q Guo, F Juefei-Xu, X Xie, L Ma, W Feng, Y Liu, J Zhao
Proceedings of the 28th ACM International Conference on Multimedia, 4318-4327, 2020
82020
Typestate-Guided Fuzzer for Discovering Use-after-Free Vulnerabilities
H Wang, X Xie, Y Li, C Wen, Y Li, Y Liu, S Qin, H Chen, Y Sui
42nd International Conference on Software Engineering, 2020
82020
The system can't perform the operation now. Try again later.
Articles 1–20