Picture for Xiaofei Xie

Xiaofei Xie

Nanyang Technological University, Singapore

AdaptiveFL: Adaptive Heterogeneous Federated Learning for Resource-Constrained AIoT Systems

Add code
Nov 22, 2023
Figure 1 for AdaptiveFL: Adaptive Heterogeneous Federated Learning for Resource-Constrained AIoT Systems
Figure 2 for AdaptiveFL: Adaptive Heterogeneous Federated Learning for Resource-Constrained AIoT Systems
Figure 3 for AdaptiveFL: Adaptive Heterogeneous Federated Learning for Resource-Constrained AIoT Systems
Figure 4 for AdaptiveFL: Adaptive Heterogeneous Federated Learning for Resource-Constrained AIoT Systems
Viaarxiv icon

When GPT Meets Program Analysis: Towards Intelligent Detection of Smart Contract Logic Vulnerabilities in GPTScan

Add code
Aug 07, 2023
Figure 1 for When GPT Meets Program Analysis: Towards Intelligent Detection of Smart Contract Logic Vulnerabilities in GPTScan
Figure 2 for When GPT Meets Program Analysis: Towards Intelligent Detection of Smart Contract Logic Vulnerabilities in GPTScan
Figure 3 for When GPT Meets Program Analysis: Towards Intelligent Detection of Smart Contract Logic Vulnerabilities in GPTScan
Figure 4 for When GPT Meets Program Analysis: Towards Intelligent Detection of Smart Contract Logic Vulnerabilities in GPTScan
Viaarxiv icon

Evaluating the Robustness of Test Selection Methods for Deep Neural Networks

Add code
Jul 29, 2023
Viaarxiv icon

Multi-target Backdoor Attacks for Code Pre-trained Models

Add code
Jun 14, 2023
Figure 1 for Multi-target Backdoor Attacks for Code Pre-trained Models
Figure 2 for Multi-target Backdoor Attacks for Code Pre-trained Models
Figure 3 for Multi-target Backdoor Attacks for Code Pre-trained Models
Figure 4 for Multi-target Backdoor Attacks for Code Pre-trained Models
Viaarxiv icon

RNNS: Representation Nearest Neighbor Search Black-Box Attack on Code Models

Add code
May 20, 2023
Viaarxiv icon

Evading DeepFake Detectors via Adversarial Statistical Consistency

Add code
Apr 23, 2023
Figure 1 for Evading DeepFake Detectors via Adversarial Statistical Consistency
Figure 2 for Evading DeepFake Detectors via Adversarial Statistical Consistency
Figure 3 for Evading DeepFake Detectors via Adversarial Statistical Consistency
Figure 4 for Evading DeepFake Detectors via Adversarial Statistical Consistency
Viaarxiv icon

Neural Episodic Control with State Abstraction

Add code
Jan 27, 2023
Viaarxiv icon

Is Self-Attention Powerful to Learn Code Syntax and Semantics?

Add code
Dec 20, 2022
Viaarxiv icon

Decompiling x86 Deep Neural Network Executables

Add code
Oct 04, 2022
Figure 1 for Decompiling x86 Deep Neural Network Executables
Figure 2 for Decompiling x86 Deep Neural Network Executables
Figure 3 for Decompiling x86 Deep Neural Network Executables
Figure 4 for Decompiling x86 Deep Neural Network Executables
Viaarxiv icon

Efficient Testing of Deep Neural Networks via Decision Boundary Analysis

Add code
Jul 22, 2022
Figure 1 for Efficient Testing of Deep Neural Networks via Decision Boundary Analysis
Figure 2 for Efficient Testing of Deep Neural Networks via Decision Boundary Analysis
Figure 3 for Efficient Testing of Deep Neural Networks via Decision Boundary Analysis
Figure 4 for Efficient Testing of Deep Neural Networks via Decision Boundary Analysis
Viaarxiv icon