Publications

You can also find my articles on Google Scholar.

Loop Analysis and Summarization

  1. Xiaofei Xie, Bihuan Chen, Liang Zou, Yang Liu, Wei Le, and Xiaohong Li. X. Xie, B. Chen, L. Zou, Y. Liu, W. Le and X. Li, “Automatic Loop Summarization via Path Dependency Analysis.” In IEEE Transactions on Software Engineering, vol. 45, no. 6, pp. 537-557, TSE 2019
  2. Xiaofei Xie, Bihuan Chen, Liang Zou, Shang-Wei Lin, Yang Liu, and Xiaohong Li. “Loopster: static loop termination analysis.” In Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, pp. 84-94. ACM, ESEC/FSE 2017
  3. Xiaofei Xie, Bihuan Chen, Yang Liu, Wei Le, and Xiaohong Li. “Proteus: Computing disjunctive loop summary via path dependency analysis.” In Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 61-72. ACM, FSE 2016, ACM SIGSOFT Distinguished Paper Award
  4. Xiaofei Xie. “Static loop analysis and its applications.” In Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 1130-1132. ACM, FSE Student Research Competition 2016
  5. Xiaofei Xie, Yang Liu, Wei Le, Xiaohong Li, and Hongxu Chen. “S-looper: automatic summarization for multipath string loops.” In Proceedings of the 2015 International Symposium on Software Testing and Analysis, pp. 188-198. ACM, ISSTA 2015

    Security and Quality of Deep Learning Systems

  6. Xiaofei Xie, Lei Ma, Felix Juefei-Xu, Minhui Xue, Hongxu Chen, Yang Liu, Jianjun Zhao, Bo Li, Jianxiong Yin, and Simon See. “DeepHunter: a coverage-guided fuzz testing framework for deep neural networks.” In Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 146-157. ACM, ISSTA 2019
  7. Xiaofei Xie, Lei Ma, Haijun Wang, Yuekang Li, Yang Liu, and Xiaohong Li. “DiffChaser: Detecting Disagreements for Deep Neural Networks.” In Proceedings of the 28th International Joint Conference on Artificial Intelligence. pp. 5772-5778. IJCAI 2019
  8. Xiaofei Xie, Hongxu Chen, Yi Li, Lei Ma, Yang Liu and Jianjun Zhao.“Coverage-Guided Fuzzing for Deep Learning Systems.” In Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, pp. to appear, ASE Tool Demo 2019
  9. Xiaoning Du, Xiaofei Xie*, Yi Li, Lei Ma, Yang Liu and Jianjun Zhao. “DeepStellar: Model-Based Quantitative Analysis of Stateful Deep Learning Systems.” In Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 477-487, ESEC/FSE 2019
  10. Qianyu Guo, Sen Chen, Xiaofei Xie, Lei Ma, Qiang Hu, Hongtao Liu, Yang Liu, Jianjun Zhao and Xiaohong Li. ”An Empirical Study towards Characterizing Deep Learning Development and Deployment across Different Frameworks and Platforms.” In Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, pp. to appear, ASE 2019
  11. Xiaoning Du, Xiaofei Xie, Yi Li, Lei Ma, Yang Liu and Jianjun Zhao. “A Quantitative Analysis Framework for Recurrent Neural Network.”In Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, pp. to appear, ASE Tool Demo 2019
  12. Qiang Hu, Lei Ma,Xiaofei Xie, Yu Bing, Yang Liu and Jianjun Zhao. “DeepMutation++: a Mutation Testing Framework for Deep Learning Systems.” In Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, pp. to appear, ASE Tool Demo 2019
  13. Bai Xue, Yang Liu, Lei Ma, Xiyue Zhang, Meng Sun and Xiaofei Xie. “Safe Inputs Generation for Black-box Systems.” In Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, pp. to appear, ICECCS 2019.

    Software Testing, Verification and Security

  14. Xiaofei Xie, Xiaohong Li, Xiang Chen, Guozhu Meng and Yang Liu. “Hybrid Testing Based on Symbolic Execution and Fuzzing.” In Journal of Software, 2019, 30 (10)
  15. Xiaofei Xie, Xiaohong Li, Kunyu Cao, Zhiyong Feng. “Security modeling based on CSP for network protocol.” Int. J. Digit. Content Technol. Appl 6, pp. 496-504. 2012.
  16. Xiaofei Xie, Xiaohong Li, Yang Liu, Li Li, Ruitao Feng and Zhiyong Feng. “Automatic Verification for Later-Correspondence of Security Protocols.” In International Workshop on Structured Object-Oriented Formal Language and Method, pp. 111-126. Springer, Cham, 2014.
  17. Yan Zheng, Xiaofei Xie*, Ting Su, Lei Ma, Jianye Hao, Zhaopeng Meng, Yang Liu, Ruimin Shen, Yinfeng Chen and Changjie Fan “Wuji: Automatic Online Combat Game Testing Using Evolutionary Deep Reinforcement Learning”. In Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, pp. to appear, ASE 2019, ACM SIGSOFT Distinguished Paper Award
  18. Haijun Wang, Xiaofei Xie*, Shang-Wei Lin, Shengchao Qin, Yun Lin, Yuekang Li, Yang Liu and Ting Liu. “Locating Buffer Overflows in Binaries via Recovering Memory Layout” In Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 718–728, ESEC/FSE 2019
  19. Hongxu Chen, Yinxing Xue, Yuekang Li, Bihuan Chen, Xiaofei Xie, Xiuheng Wu and Yang Liu. “Hawkeye: towards a desired directed grey-box fuzzer.” In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 2095-2108. ACM, CCS 2018
  20. Yuekang Li, Yinxing Xue, Hongxu Chen, Xiuheng Wu,Xiaofei Xie, Haijun Wang,Yang Liu and Jianwei Yin. “CEREBRO: Context-aware adaptive fuzzing for effective vulnerability detection.” ” In Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 533–544, ESEC/FSE 2019
  21. Ruitao Feng, Sen Chen, Xiaofei Xie, Lei Ma, Shangwei Lin and Yang Liu. “MobiDroid: A Performance-Sensitive Malware Detection System on Mobile Platform” In Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, pp. to appear, ICECCS 2019
  22. Hao Li, Xiaohong Li, Xiang Chen, Xiaofei Xie, Yanzhou Mu and Zhiyong Feng.“Cross-project Defect Prediction via ASTToken2Vec and BLSTM based Neural Network”. In Proceedings of the 2019 International Joint Conference on Neural Networks, IJCNN 2019
  23. Li, Hongbo, Xiaohong Li, Jianye Hao, Guangquan Xu, Zhiyong Feng, and Xiaofei Xie. “Fesr: A framework for eliciting security requirements based on integration of common criteria and weakness detection formal model.” In Proceedings 2017 IEEE International Conference on Software Quality, Reliability and Security, pp. 352-363. IEEE, QRS 2017.