Xiaofei Xie
Xiaofei Xie
Nanyang Technological University
Verified email at tju.edu.cn - Homepage
Title
Cited by
Cited by
Year
Deephunter: A coverage-guided fuzz testing framework for deep neural networks
X Xie, L Ma, F Juefei-Xu, M Xue, H Chen, Y Liu, J Zhao, B Li, J Yin, S See
Proceedings of the 28th ACM SIGSOFT International Symposium on Software …, 2019
67*2019
Hawkeye: Towards a desired directed grey-box fuzzer
H Chen, Y Xue, Y Li, B Chen, X Xie, X Wu, Y Liu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
472018
Deepstellar: Model-based quantitative analysis of stateful deep learning systems
X Du, X Xie, Y Li, L Ma, Y Liu, J Zhao
Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019
33*2019
Proteus: Computing disjunctive loop summary via path dependency analysis
X Xie, B Chen, Y Liu, W Le, X Li
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
302016
S-looper: automatic summarization for multipath string loops
X Xie, Y Liu, W Le, X Li, H Chen
Proceedings of the 2015 International Symposium on Software Testing and …, 2015
302015
DiffChaser: Detecting Disagreements for Deep Neural Networks.
X Xie, L Ma, H Wang, Y Li, Y Liu, X Li
IJCAI, 5772-5778, 2019
192019
Fakespotter: A simple baseline for spotting ai-synthesized fake faces
R Wang, L Ma, F Juefei-Xu, X Xie, J Wang, Y Liu
arXiv preprint arXiv:1909.06122, 2019
182019
An empirical study towards characterizing deep learning development and deployment across different frameworks and platforms
Q Guo, S Chen, X Xie, L Ma, Q Hu, H Liu, Y Liu, J Zhao, X Li
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
112019
Metamorphic relation based adversarial attacks on differentiable neural computer
A Chan, L Ma, F Juefei-Xu, X Xie, Y Liu, YS Ong
arXiv preprint arXiv:1809.02444, 2018
92018
Automatic loop summarization via path dependency analysis
X Xie, B Chen, L Zou, Y Liu, W Le, X Li
IEEE Transactions on Software Engineering 45 (6), 537-557, 2017
92017
Cerebro: context-aware adaptive fuzzing for effective vulnerability detection
Y Li, Y Xue, H Chen, X Wu, C Zhang, X Xie, H Wang, Y Liu
Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019
82019
Wuji: Automatic online combat game testing using evolutionary deep reinforcement learning
Y Zheng, X Xie, T Su, L Ma, J Hao, Z Meng, Y Liu, R Shen, Y Chen, C Fan
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
72019
Security modeling based on CSP for network protocol
XF Xie, XH Li, KY Cao, ZY Feng
Int. J. Digit. Content Technol. Appl 6, 496-504, 2012
72012
Mobidroid: A performance-sensitive malware detection system on mobile platform
R Feng, S Chen, X Xie, L Ma, G Meng, Y Liu, SW Lin
2019 24th International Conference on Engineering of Complex Computer …, 2019
62019
Locating vulnerabilities in binaries via memory layout recovering
H Wang, X Xie, SW Lin, Y Lin, Y Li, S Qin, Y Liu, T Liu
Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019
52019
Typestate-Guided Fuzzer for Discovering Use-after-Free Vulnerabilities
H Wang, X Xie, Y Li, C Wen, Y Li, Y Liu, S Qin, H Chen, Y Sui
42nd International Conference on Software Engineering, 2020
42020
Memlock: Memory usage guided fuzzing
C Wen, H Wang, Y Li, S Qin, Y Liu, Z Xu, H Chen, X Xie, G Pu, T Liu
42nd International Conference on Software Engineering, 2020
42020
Towards characterizing adversarial defects of deep learning software from the lens of uncertainty
X Zhang, X Xie, L Ma, X Du, Q Hu, Y Liu, J Zhao, M Sun
arXiv preprint arXiv:2004.11573, 2020
42020
Stealthy and efficient adversarial attacks against deep reinforcement learning
J Sun, T Zhang, X Xie, L Ma, Y Zheng, K Chen, Y Liu
arXiv preprint arXiv:2005.07099, 2020
32020
ABBA: Saliency-Regularized Motion-Based Adversarial Blur Attack
Q Guo, F Juefei-Xu, X Xie, L Ma, J Wang, W Feng, Y Liu
arXiv preprint arXiv:2002.03500, 2020
32020
The system can't perform the operation now. Try again later.
Articles 1–20