Follow
Yan Xiao
Yan Xiao
Verified email at mail.sysu.edu.cn - Homepage
Title
Cited by
Year
UniAda: Universal Adaptive Multiobjective Adversarial Attack for End-to-End Autonomous Driving Systems
J Zhang, JW Keung, Y Xiao, Y Liao, Y Li, X Ma
IEEE Transactions on Reliability, 2024
2024
Towards stealthy backdoor attacks against speech recognition via elements of sound
H Cai, P Zhang, H Dong, Y Xiao, S Koffas, Y Li
IEEE Transactions on Information Forensics and Security, 2024
62024
Enhancing Valid Test Input Generation with Distribution Awareness for Deep Neural Networks
J ZHANG, J Keung, MA Xiaoxue, X Li, Y Xiao, LI Yishu, WK CHAN
48th IEEE International Conference on Computers, Software, and Applications …, 2024
2024
PonziFinder: Attention-Based Edge-Enhanced Ponzi Contract Detection
Y Chen, B Li, Y Xiao, X Du
IEEE Transactions on Reliability, 2024
2024
RITFIS: Robust input testing framework for LLMs-based intelligent software
M Xiao, Y Xiao, H Dong, S Ji, P Zhang
arXiv preprint arXiv:2402.13518, 2024
2024
Improving the undersampling technique by optimizing the termination condition for software defect prediction
S Feng, J Keung, Y Xiao, P Zhang, X Yu, X Cao
Expert Systems with Applications 235, 121084, 2024
62024
On the relative value of imbalanced learning for code smell detection
F Li, K Zou, JW Keung, X Yu, S Feng, Y Xiao
Software: Practice and Experience 53 (10), 1902-1927, 2023
112023
Empirical Study on Transformer-based Techniques for Software Engineering
Y Xiao, X Zuo, L Xue, K Wang, JS Dong, I Beschastnikh
arXiv preprint arXiv:2310.00399, 2023
12023
LEAP: Efficient and Automated Test Method for NLP Software
M Xiao, Y Xiao, H Dong, S Ji, P Zhang
2023 38th IEEE/ACM International Conference on Automated Software …, 2023
22023
BiAn: Smart Contract Source Code Obfuscation
P Zhang, Q Yu, Y Xiao, H Dong, X Luo, X Wang, M Zhang
IEEE Transactions on Software Engineering, 2023
22023
Ponzi scheme detection based on control flow graph feature extraction
S Ji, C Huang, P Zhang, H Dong, Y Xiao
2023 IEEE international conference on web services (ICWS), 585-594, 2023
32023
A survey on smart contract vulnerabilities: Data sources, detection and repair
H Chu, P Zhang, H Dong, Y Xiao, S Ji, W Li
Information and Software Technology 159, 107221, 2023
172023
A Semisupervised Approach for Industrial Anomaly Detection via Self-Adaptive Clustering
X Ma, J Keung, P He, Y Xiao, X Yu, Y Li
IEEE Transactions on Industrial Informatics 20 (2), 1687-1697, 2023
62023
On the significance of category prediction for code-comment synchronization
Z Yang, JW Keung, X Yu, Y Xiao, Z Jin, J Zhang
ACM Transactions on Software Engineering and Methodology 32 (2), 1-41, 2023
282023
VSVC: Backdoor attack against keyword spotting based on voiceprint selection and voice conversion
H Cai, P Zhang, H Dong, Y Xiao, S Ji
arXiv preprint arXiv:2212.10103, 2022
42022
Bytecode obfuscation for smart contracts
Q Yu, P Zhang, H Dong, Y Xiao, S Ji
2022 29th Asia-Pacific Software Engineering Conference (APSEC), 566-567, 2022
12022
PBSM: Backdoor attack against Keyword spotting based on pitch boosting and sound masking
H Cai, P Zhang, H Dong, Y Xiao, S Ji
arXiv preprint arXiv:2211.08697, 2022
32022
Repairing failure-inducing inputs with input reflection
Y Xiao, Y Lin, I Beschastnikh, C Sun, D Rosenblum, JS Dong
Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022
52022
Self-checking deep neural networks for anomalies and adversaries in deployment
Y Xiao, I Beschastnikh, Y Lin, RS Hundal, X Xie, DS Rosenblum, JS Dong
IEEE Transactions on Dependable and Secure Computing, 2022
82022
Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective
M Huasong Meng, G Bai, S Gee Teo, Z Hou, Y Xiao, Y Lin, JS Dong
arXiv e-prints, arXiv: 2206.12227, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20