Alert button
Picture for Xiaofei Xie

Xiaofei Xie

Alert button

Importance Guided Data Augmentation for Neural-Based Code Understanding

Feb 24, 2024
Zeming Dong, Qiang Hu, Xiaofei Xie, Maxime Cordy, Mike Papadakis, Jianjun Zhao

Viaarxiv icon

AdaptiveFL: Adaptive Heterogeneous Federated Learning for Resource-Constrained AIoT Systems

Nov 22, 2023
Chentao Jia, Ming Hu, Zekai Chen, Yanxin Yang, Xiaofei Xie, Yang Liu, Mingsong Chen

Viaarxiv icon

Have Your Cake and Eat It Too: Toward Efficient and Accurate Split Federated Learning

Nov 22, 2023
Dengke Yan, Ming Hu, Zeke Xia, Yanxin Yang, Jun Xia, Xiaofei Xie, Mingsong Chen

Viaarxiv icon

When GPT Meets Program Analysis: Towards Intelligent Detection of Smart Contract Logic Vulnerabilities in GPTScan

Aug 07, 2023
Yuqiang Sun, Daoyuan Wu, Yue Xue, Han Liu, Haijun Wang, Zhengzi Xu, Xiaofei Xie, Yang Liu

Figure 1 for When GPT Meets Program Analysis: Towards Intelligent Detection of Smart Contract Logic Vulnerabilities in GPTScan
Figure 2 for When GPT Meets Program Analysis: Towards Intelligent Detection of Smart Contract Logic Vulnerabilities in GPTScan
Figure 3 for When GPT Meets Program Analysis: Towards Intelligent Detection of Smart Contract Logic Vulnerabilities in GPTScan
Figure 4 for When GPT Meets Program Analysis: Towards Intelligent Detection of Smart Contract Logic Vulnerabilities in GPTScan
Viaarxiv icon

Evaluating the Robustness of Test Selection Methods for Deep Neural Networks

Jul 29, 2023
Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Wei Ma, Mike Papadakis, Yves Le Traon

Figure 1 for Evaluating the Robustness of Test Selection Methods for Deep Neural Networks
Figure 2 for Evaluating the Robustness of Test Selection Methods for Deep Neural Networks
Figure 3 for Evaluating the Robustness of Test Selection Methods for Deep Neural Networks
Figure 4 for Evaluating the Robustness of Test Selection Methods for Deep Neural Networks
Viaarxiv icon

Multi-target Backdoor Attacks for Code Pre-trained Models

Jun 14, 2023
Yanzhou Li, Shangqing Liu, Kangjie Chen, Xiaofei Xie, Tianwei Zhang, Yang Liu

Figure 1 for Multi-target Backdoor Attacks for Code Pre-trained Models
Figure 2 for Multi-target Backdoor Attacks for Code Pre-trained Models
Figure 3 for Multi-target Backdoor Attacks for Code Pre-trained Models
Figure 4 for Multi-target Backdoor Attacks for Code Pre-trained Models
Viaarxiv icon

RNNS: Representation Nearest Neighbor Search Black-Box Attack on Code Models

May 20, 2023
Jie Zhang, Wei Ma, Qiang Hu, Xiaofei Xie, Yves Le Traon, Yang Liu

Figure 1 for RNNS: Representation Nearest Neighbor Search Black-Box Attack on Code Models
Figure 2 for RNNS: Representation Nearest Neighbor Search Black-Box Attack on Code Models
Figure 3 for RNNS: Representation Nearest Neighbor Search Black-Box Attack on Code Models
Figure 4 for RNNS: Representation Nearest Neighbor Search Black-Box Attack on Code Models
Viaarxiv icon

Evading DeepFake Detectors via Adversarial Statistical Consistency

Apr 23, 2023
Yang Hou, Qing Guo, Yihao Huang, Xiaofei Xie, Lei Ma, Jianjun Zhao

Figure 1 for Evading DeepFake Detectors via Adversarial Statistical Consistency
Figure 2 for Evading DeepFake Detectors via Adversarial Statistical Consistency
Figure 3 for Evading DeepFake Detectors via Adversarial Statistical Consistency
Figure 4 for Evading DeepFake Detectors via Adversarial Statistical Consistency
Viaarxiv icon

Neural Episodic Control with State Abstraction

Jan 27, 2023
Zhuo Li, Derui Zhu, Yujing Hu, Xiaofei Xie, Lei Ma, Yan Zheng, Yan Song, Yingfeng Chen, Jianjun Zhao

Figure 1 for Neural Episodic Control with State Abstraction
Figure 2 for Neural Episodic Control with State Abstraction
Figure 3 for Neural Episodic Control with State Abstraction
Figure 4 for Neural Episodic Control with State Abstraction
Viaarxiv icon