Xiaofei Xie
Xiaofei Xie
Nanyang Technological University
Verified email at tju.edu.cn - Homepage
TitleCited byYear
DeepHunter: a coverage-guided fuzz testing framework for deep neural networks
X Xie, L Ma, F Juefei-Xu, M Xue, H Chen, Y Liu, J Zhao, B Li, J Yin, S See
Proceedings of the 28th ACM SIGSOFT International Symposium on Software …, 2019
46*2019
Hawkeye: Towards a desired directed grey-box fuzzer
H Chen, Y Xue, Y Li, B Chen, X Xie, X Wu, Y Liu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
302018
Deepstellar: model-based quantitative analysis of stateful deep learning systems
X Du, X Xie, Y Li, L Ma, Y Liu, J Zhao
Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019
26*2019
S-looper: Automatic summarization for multipath string loops
X Xie, Y Liu, W Le, X Li, H Chen
Proceedings of the 2015 International Symposium on Software Testing and …, 2015
262015
Proteus: Computing disjunctive loop summary via path dependency analysis
X Xie, B Chen, Y Liu, W Le, X Li
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
252016
Diffchaser: Detecting disagreements for deep neural networks
X Xie, L Ma, H Wang, Y Li, Y Liu, X Li
Proceedings of the 28th International Joint Conference on Artificial …, 2019
132019
Metamorphic relation based adversarial attacks on differentiable neural computer
A Chan, L Ma, F Juefei-Xu, X Xie, Y Liu, YS Ong
arXiv preprint arXiv:1809.02444, 2018
92018
Fakespotter: A simple baseline for spotting ai-synthesized fake faces
R Wang, L Ma, F Juefei-Xu, X Xie, J Wang, Y Liu
arXiv preprint arXiv:1909.06122, 2019
82019
An empirical study towards characterizing deep learning development and deployment across different frameworks and platforms
Q Guo, S Chen, X Xie, L Ma, Q Hu, H Liu, Y Liu, J Zhao, X Li
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
72019
Security modeling based on CSP for network protocol
XF Xie, XH Li, KY Cao, ZY Feng
Int. J. Digit. Content Technol. Appl 6, 496-504, 2012
72012
Automatic loop summarization via path dependency analysis
X Xie, B Chen, L Zou, Y Liu, W Le, X Li
IEEE Transactions on Software Engineering, 2017
62017
Cerebro: context-aware adaptive fuzzing for effective vulnerability detection
Y Li, Y Xue, H Chen, X Wu, C Zhang, X Xie, H Wang, Y Liu
Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019
32019
Wuji: Automatic online combat game testing using evolutionary deep reinforcement learning
Y Zheng, X Xie, T Su, L Ma, J Hao, Z Meng, Y Liu, R Shen, Y Chen, C Fan
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
22019
Locating vulnerabilities in binaries via memory layout recovering
H Wang, X Xie, SW Lin, Y Lin, Y Li, S Qin, Y Liu, T Liu
Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019
22019
Loopster: Static loop termination analysis
X Xie, B Chen, L Zou, SW Lin, Y Liu, X Li
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
22017
Memlock: Memory usage guided fuzzing
C Wen, H Wang, Y Li, S Qin, Y Liu, Z Xu, H Chen, X Xie, G Pu, T Liu
ICSE, 2020
12020
Amora: Black-box Adversarial Morphing Attack
R Wang, F Juefei-Xu, X Xie, L Ma, Y Huang, Y Liu
arXiv preprint arXiv:1912.03829, 2019
12019
Mobidroid: A performance-sensitive malware detection system on mobile platform
R Feng, S Chen, X Xie, L Ma, G Meng, Y Liu, SW Lin
2019 24th International Conference on Engineering of Complex Computer …, 2019
12019
Fesr: A framework for eliciting security requirements based on integration of common criteria and weakness detection formal model
H Li, X Li, J Hao, G Xu, Z Feng, X Xie
2017 IEEE International Conference on Software Quality, Reliability and …, 2017
12017
Automatic verification for later-correspondence of security protocols
X Xie, X Li, Y Liu, L Li, R Feng, Z Feng
International Workshop on Structured Object-Oriented Formal Language and …, 2014
12014
The system can't perform the operation now. Try again later.
Articles 1–20