default search action
Yan Xiao 0002
Person information
- affiliation: Sun Yat-sen University, School of Cyber Science and Technology, China
- affiliation (former): National University of Singapore, Singapore
- affiliation (former): City University of Hong Kong, Hong Kong
Other persons with the same name
- Yan Xiao — disambiguation page
- Yan Xiao 0001 — University of Texas at Arlington, College of Nursing and Health Innovation, TX, USA (and 3 more)
- Yan Xiao 0003 — Ryerson University, Department of Aerospace Engineering, Toronto, ON, Canada (and 1 more)
Other persons with a similar name
- Xiaoyan Li (aka: Xiao-Yan Li, Li Xiaoyan) — disambiguation page
- Xiaoyan Liu (aka: Xiao-yan Liu, Xiao-Yan Liu) — disambiguation page
- Xiaoyan Sun (aka: Xiao-Yan Sun) — disambiguation page
- Xiaoyan Tang (aka: XiaoYan Tang, Xiao-Yan Tang)
- Xiao Yan — disambiguation page
- Xiao Yan 0001 — University of Electronic Science and Technology of China, School of Aeronautics and Astronautics, Chengdu
- Xiao Yan 0002 — Southern University of Science and Technology, Department of Computer Science and Engineering, China (and 2 more)
- Xiaoyan Zhang (aka: Xiao-yan Zhang, Xiao-Yan Zhang) — disambiguation page
- Xiaoyan Zhang 0001 (aka: Xiao-Yan Zhang 0001) — Nanjing Normal University, School of Mathematical Science / Institute of Mathematics, China
- Xiaoyan Zhao (aka: Xiao-Yan Zhao, Xiao-yan Zhao) — disambiguation page
- show all similar names
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Shuo Feng, Jacky Keung, Yan Xiao, Peichang Zhang, Xiao Yu, Xiaochun Cao:
Improving the undersampling technique by optimizing the termination condition for software defect prediction. Expert Syst. Appl. 235: 121084 (2024) - [j18]Hanbo Cai, Pengcheng Zhang, Hai Dong, Yan Xiao, Stefanos Koffas, Yiming Li:
Toward Stealthy Backdoor Attacks Against Speech Recognition via Elements of Sound. IEEE Trans. Inf. Forensics Secur. 19: 5852-5866 (2024) - [j17]Xiaoxue Ma, Jacky Keung, Pinjia He, Yan Xiao, Xiao Yu, Yishu Li:
A Semisupervised Approach for Industrial Anomaly Detection via Self-Adaptive Clustering. IEEE Trans. Ind. Informatics 20(2): 1687-1697 (2024) - [c17]Jingyu Zhang, Jacky Keung, Xiaoxue Ma, Xiangyu Li, Yan Xiao, Yishu Li, Wing Kwong Chan:
Enhancing Valid Test Input Generation with Distribution Awareness for Deep Neural Networks. COMPSAC 2024: 1095-1100 - [i11]Mingxuan Xiao, Yan Xiao, Hai Dong, Shunhui Ji, Pengcheng Zhang:
RITFIS: Robust input testing framework for LLMs-based intelligent software. CoRR abs/2402.13518 (2024) - 2023
- [j16]Hanting Chu, Pengcheng Zhang, Hai Dong, Yan Xiao, Shunhui Ji, Wenrui Li:
A survey on smart contract vulnerabilities: Data sources, detection and repair. Inf. Softw. Technol. 159: 107221 (2023) - [j15]Fuyang Li, Kuan Zou, Jacky Wai Keung, Xiao Yu, Shuo Feng, Yan Xiao:
On the relative value of imbalanced learning for code smell detection. Softw. Pract. Exp. 53(10): 1902-1927 (2023) - [j14]Zhen Yang, Jacky Wai Keung, Xiao Yu, Yan Xiao, Zhi Jin, Jingyu Zhang:
On the Significance of Category Prediction for Code-Comment Synchronization. ACM Trans. Softw. Eng. Methodol. 32(2): 30:1-30:41 (2023) - [j13]Pengcheng Zhang, Qifan Yu, Yan Xiao, Hai Dong, Xiapu Luo, Xiao Wang, Meng Zhang:
BiAn: Smart Contract Source Code Obfuscation. IEEE Trans. Software Eng. 49(9): 4456-4476 (2023) - [c16]Shunhui Ji, Congxiong Huang, Pengcheng Zhang, Hai Dong, Yan Xiao:
Ponzi Scheme Detection Based on Control Flow Graph Feature Extraction. ICWS 2023: 585-594 - [c15]Mingxuan Xiao, Yan Xiao, Hai Dong, Shunhui Ji, Pengcheng Zhang:
LEAP: Efficient and Automated Test Method for NLP Software. ASE 2023: 1136-1148 - [i10]Hanbo Cai, Pengcheng Zhang, Hai Dong, Yan Xiao, Stefanos Koffas, Yiming Li:
Towards Stealthy Backdoor Attacks against Speech Recognition via Elements of Sound. CoRR abs/2307.08208 (2023) - [i9]Mingxuan Xiao, Yan Xiao, Hai Dong, Shunhui Ji, Pengcheng Zhang:
LEAP: Efficient and Automated Test Method for NLP Software. CoRR abs/2308.11284 (2023) - [i8]Yan Xiao, Xinyue Zuo, Lei Xue, Kailong Wang, Jin Song Dong, Ivan Beschastnikh:
Empirical Study on Transformer-based Techniques for Software Engineering. CoRR abs/2310.00399 (2023) - 2022
- [j12]Shuo Feng, Jacky Keung, Peichang Zhang, Yan Xiao, Miao Zhang:
The impact of the distance metric and measure on SMOTE-based techniques in software defect prediction. Inf. Softw. Technol. 142: 106742 (2022) - [j11]Xiao Yu, Jacky Keung, Yan Xiao, Shuo Feng, Fuyang Li, Heng Dai:
Predicting the precise number of software defects: Are we there yet? Inf. Softw. Technol. 146: 106847 (2022) - [c14]Qifan Yu, Pengcheng Zhang, Hai Dong, Yan Xiao, Shunhui Ji:
Bytecode Obfuscation for Smart Contracts. APSEC 2022: 566-567 - [c13]Yan Xiao, Yun Lin, Ivan Beschastnikh, Changsheng Sun, David S. Rosenblum, Jin Song Dong:
Repairing Failure-inducing Inputs with Input Reflection. ASE 2022: 85:1-85:13 - [i7]Mark Huasong Meng, Guangdong Bai, Sin Gee Teo, Zhe Hou, Yan Xiao, Yun Lin, Jin Song Dong:
Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective. CoRR abs/2206.12227 (2022) - [i6]Hanbo Cai, Pengcheng Zhang, Hai Dong, Yan Xiao, Shunhui Ji:
PBSM: Backdoor attack against Keyword spotting based on pitch boosting and sound masking. CoRR abs/2211.08697 (2022) - [i5]Hanbo Cai, Pengcheng Zhang, Hai Dong, Yan Xiao, Shunhui Ji:
VSVC: Backdoor attack against Keyword Spotting based on Voiceprint Selection and Voice Conversion. CoRR abs/2212.10103 (2022) - 2021
- [j10]Qing Mi, Yan Xiao, Zhi Cai, Xibin Jia:
The effectiveness of data augmentation in code readability classification. Inf. Softw. Technol. 129: 106378 (2021) - [j9]Shuo Feng, Jacky Keung, Xiao Yu, Yan Xiao, Kwabena Ebo Bennin, Md. Alamgir Kabir, Miao Zhang:
COSTE: Complexity-based OverSampling TEchnique to alleviate the class imbalance problem in software defect prediction. Inf. Softw. Technol. 129: 106432 (2021) - [j8]Miao Zhang, Jacky Wai Keung, Yan Xiao, Md. Alamgir Kabir:
Evaluating the effects of similar-class combination on class integration test order generation. Inf. Softw. Technol. 129: 106438 (2021) - [j7]Miao Zhang, Jacky Wai Keung, Tsong Yueh Chen, Yan Xiao:
Validating class integration test order generation systems with Metamorphic Testing. Inf. Softw. Technol. 132: 106507 (2021) - [j6]Shuo Feng, Jacky Keung, Xiao Yu, Yan Xiao, Miao Zhang:
Investigation on the stability of SMOTE-based oversampling techniques in software defect prediction. Inf. Softw. Technol. 139: 106662 (2021) - [c12]Shuo Feng, Jacky Keung, Jie Liu, Yan Xiao, Xiao Yu, Miao Zhang:
ROCT: Radius-based Class Overlap Cleaning Technique to Alleviate the Class Overlap Problem in Software Defect Prediction. COMPSAC 2021: 228-237 - [c11]Yan Xiao, Ivan Beschastnikh, David S. Rosenblum, Changsheng Sun, Sebastian G. Elbaum, Yun Lin, Jin Song Dong:
Self-Checking Deep Neural Networks in Deployment. ICSE 2021: 372-384 - [i4]Yan Xiao, Ivan Beschastnikh, David S. Rosenblum, Changsheng Sun, Sebastian G. Elbaum, Yun Lin, Jin Song Dong:
Self-Checking Deep Neural Networks in Deployment. CoRR abs/2103.02371 (2021) - [i3]Yan Xiao, Yun Lin, Ivan Beschastnikh, Changsheng Sun, David S. Rosenblum, Jin Song Dong:
Generalizing Neural Networks by Reflecting Deviating Data in Production. CoRR abs/2110.02718 (2021) - 2020
- [c10]Zhen Yang, Jacky Keung, Miao Zhang, Yan Xiao, Yangyang Huang, Tik Hui:
Smart Contracts Vulnerability Auditing with Multi-semantics. COMPSAC 2020: 892-901
2010 – 2019
- 2019
- [j5]Yan Xiao, Jacky Keung, Kwabena Ebo Bennin, Qing Mi:
Improving bug localization with word embedding and enhanced convolutional neural networks. Inf. Softw. Technol. 105: 17-29 (2019) - [j4]George Trimponias, Yan Xiao, Xiaorui Wu, Hong Xu, Yanhui Geng:
Node-Constrained Traffic Engineering: Theory and Applications. IEEE/ACM Trans. Netw. 27(4): 1344-1358 (2019) - [c9]Miao Zhang, Jacky Keung, Yan Xiao, Md. Alamgir Kabir, Shuo Feng:
A Heuristic Approach to Break Cycles for the Class Integration Test Order Generation. COMPSAC (1) 2019: 47-52 - [i2]George Trimponias, Yan Xiao, Xiaorui Wu, Hong Xu, Yanhui Geng:
Node-Constrained Traffic Engineering: Theory and Applications. CoRR abs/1907.03058 (2019) - 2018
- [j3]Yan Xiao, Jacky Keung, Kwabena Ebo Bennin, Qing Mi:
Machine translation-based bug localization technique for bridging lexical gap. Inf. Softw. Technol. 99: 58-61 (2018) - [j2]Qing Mi, Jacky Keung, Yan Xiao, Solomon Mensah, Yujin Gao:
Improving code readability classification using convolutional neural networks. Inf. Softw. Technol. 104: 60-71 (2018) - [c8]Yan Xiao, Jacky Keung:
Improving Bug Localization with Character-Level Convolutional Neural Network and Recurrent Neural Network. APSEC 2018: 703-704 - [c7]Yan Xiao, Jacky Keung, Qing Mi, Kwabena Ebo Bennin:
Bug Localization with Semantic and Structural Features using Convolutional Neural Network and Cascade Forest. EASE 2018: 101-111 - [c6]Qing Mi, Jacky Keung, Yan Xiao, Solomon Mensah, Xiupei Mei:
An Inception Architecture-Based Model for Improving Code Readability Classification. EASE 2018: 139-144 - 2017
- [c5]Yan Xiao, Jacky Keung, Qing Mi, Kwabena Ebo Bennin:
Improving Bug Localization with an Enhanced Convolutional Neural Network. APSEC 2017: 338-347 - [c4]Qing Mi, Yujin Gao, Jacky Keung, Yan Xiao, Solomon Mensah:
Identifying Textual Features of High-Quality Questions: An Empirical Study on Stack Overflow. APSEC 2017: 636-641 - [c3]Qing Mi, Jacky Keung, Jianglin Huang, Yan Xiao:
Using Eye Tracking Technology to Analyze the Impact of Stylistic Inconsistency on Code Readability. QRS Companion 2017: 579-580 - [i1]George Trimponias, Yan Xiao, Hong Xu, Xiaorui Wu, Yanhui Geng:
On Traffic Engineering with Segment Routing in SDN based WANs. CoRR abs/1703.05907 (2017) - 2016
- [j1]Pengcheng Zhang, Yan Xiao, Yuelong Zhu, Jun Feng, Dingsheng Wan, Wenrui Li, Hareton Leung:
A New Symbolization and Distance Measure Based Anomaly Mining Approach for Hydrological Time Series. Int. J. Web Serv. Res. 13(3): 26-45 (2016) - 2015
- [c2]Dingsheng Wan, Yan Xiao, Pengcheng Zhang, Hareton Leung:
Hydrological Big Data Prediction Based on Similarity Search and Improved BP Neural Network. BigData Congress 2015: 343-350 - 2014
- [c1]Dingsheng Wan, Yan Xiao, Pengcheng Zhang, Jun Feng, Yuelong Zhu, Qian Liu:
Hydrological Time Series Anomaly Mining Based on Symbolization and Distance Measure. BigData Congress 2014: 339-346
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint