Xiaochen Li

Orcid: 0000-0002-8416-6993

According to our database1, Xiaochen Li authored at least 128 papers between 2003 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
DeepSwarm: towards swarm deep learning with bi-directional optimization of data acquisition and processing.
Frontiers Comput. Sci., March, 2025

2024
Semantic consistency knowledge transfer for unsupervised cross domain object detection.
Appl. Intell., November, 2024

Automated anomaly detection for categorical data by repurposing a form filling recommender system.
ACM J. Data Inf. Qual., September, 2024

Non-Invasive Quantification of the Brain [¹⁸F]FDG-PET Using Inferred Blood Input Function Learned From Total-Body Data With Physical Constraint.
IEEE Trans. Medical Imaging, July, 2024

Simulink Compiler Testing via Configuration Diversification With Reinforcement Learning.
IEEE Trans. Reliab., June, 2024

Analyzing and Detecting Information Types of Developer Live Chat Threads.
ACM Trans. Softw. Eng. Methodol., June, 2024

TCM-KDIF: An Information Interaction Framework Driven by Knowledge-Data and Its Clinical Application in Traditional Chinese Medicine.
IEEE Internet Things J., June, 2024

Estimating Uncertainty in Labeled Changes by SZZ Tools on Just-In-Time Defect Prediction.
ACM Trans. Softw. Eng. Methodol., May, 2024

A Testing Program and Pragma Combination Selection Based Framework for High-Level Synthesis Tool Pragma-Related Bug Detection.
IEEE Trans. Software Eng., April, 2024

Code Comment Inconsistency Detection Based on Confidence Learning.
IEEE Trans. Software Eng., March, 2024

Learning-based Relaxation of Completeness Requirements for Data Entry Forms.
ACM Trans. Softw. Eng. Methodol., March, 2024

EchoPFL: Asynchronous Personalized Federated Learning on Mobile Devices with On-Demand Staleness Control.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., March, 2024

Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory.
Proc. ACM Manag. Data, February, 2024

TLDA: A transfer learning based dual-augmentation strategy for traditional Chinese Medicine syndrome differentiation in rare disease.
Comput. Biol. Medicine, February, 2024

A Comprehensive Study of Open-Source Printed Circuit Board (PCB) Design Software Bugs.
IEEE Trans. Instrum. Meas., 2024

Privacy Enhancement Via Dummy Points in the Shuffle Model.
IEEE Trans. Dependable Secur. Comput., 2024

Quantifying the direct and indirect effects of terrain, climate and human activity on the spatial pattern of kNDVI-based vegetation growth: A case study from the Minjiang River Basin, Southeast China.
Ecol. Informatics, 2024

Graph Confident Learning for Software Vulnerability Detection.
Eng. Appl. Artif. Intell., 2024

AdaFlow: Opportunistic Inference on Asynchronous Mobile Data with Generalized Affinity Control.
CoRR, 2024

Deep Learning-based Software Engineering: Progress, Challenges, and Opportunities.
CoRR, 2024

A Novel HDL Code Generator for Effectively Testing FPGA Logic Synthesis Compilers.
CoRR, 2024

Planetarium: A Rigorous Benchmark for Translating Text to Structured Planning Languages.
CoRR, 2024

Preference Tuning For Toxicity Mitigation Generalizes Across Languages.
CoRR, 2024

DPI: Ensuring Strict Differential Privacy for Infinite Data Streaming.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

AdaFlow: Opportunistic Inference on Asynchronous Mobile Data with Generalized Affinity Control.
Proceedings of the 22nd ACM Conference on Embedded Networked Sensor Systems, 2024

On Mobile Covert Communication in Wireless Networks with a Full-Duplex Receiver.
Proceedings of the International Conference on Networking and Network Applications, 2024

Minimization of Age of Information for Satellite-Terrestrial Covert Communication with a Full-Duplex Receiver.
Proceedings of the International Conference on Networking and Network Applications, 2024

TS-ILM: Class Incremental Learning for Online Action Detection.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

VF-Detector: Making Multi-Granularity Code Changes on Vulnerability Fix Detector Robust to Mislabeled Changes.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

Preference Tuning For Toxicity Mitigation Generalizes Across Languages.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2024, 2024

2023
An Easy Data Augmentation Approach for Application Reviews Event Inference.
IEEE Trans. Software Eng., October, 2023

Critique of: "A Parallel Framework for Constraint-Based Bayesian Network Learning via Markov Blanket Discovery" by SCC Team From UC San Diego.
IEEE Trans. Parallel Distributed Syst., June, 2023

DupHunter: Detecting Duplicate Pull Requests in Fork-Based Development.
IEEE Trans. Software Eng., April, 2023

A Machine Learning Approach for Automated Filling of Categorical Fields in Data Entry Forms.
ACM Trans. Softw. Eng. Methodol., April, 2023

Sequential propagation of chaos.
CoRR, 2023

Quantifying and Defending against Privacy Threats on Federated Knowledge Graph Embedding.
Proceedings of the ACM Web Conference 2023, 2023

Detecting JavaScript Transpiler Bugs with Grammar-guided Mutation.
Proceedings of the IEEE International Conference on Software Analysis, 2023

Abstract-to-Executable Trajectory Translation for One-Shot Task Generalization.
Proceedings of the International Conference on Machine Learning, 2023

Partition Based Differential Testing for Finding Embedded Code Generation Bugs in Simulink.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

Tutorial: Data Denoising Metrics in Recommender Systems.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

Performance Benchmarking of the QUIC Transport Protocol.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

MoEnlight: Energy-efficient and self-adaptive Low-light Video Stream Enhancement on Mobile Devices.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023

2022
MemXCT Reproducibility Dataset.
Dataset, May, 2022

Detecting Compiler Warning Defects Via Diversity-Guided Program Mutation.
IEEE Trans. Software Eng., 2022

DPWord2Vec: Better Representation of Design Patterns in Semantics.
IEEE Trans. Software Eng., 2022

CTOS: Compiler Testing for Optimization Sequences of LLVM.
IEEE Trans. Software Eng., 2022

Critique of "MemXCT: Memory-Centric X-Ray CT Reconstruction With Massive Parallelization" by SCC Team From University of California San Diego.
IEEE Trans. Parallel Distributed Syst., 2022

ST-CRMF: Compensated Residual Matrix Factorization with Spatial-Temporal Regularization for Graph-Based Time Series Forecasting.
Sensors, 2022

OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization.
Proc. VLDB Endow., 2022

ACMViz: a visual analytics approach to understand DRL-based autonomous control model.
J. Vis., 2022

AdaEnlight: Energy-aware Low-light Video Stream Enhancement on Mobile Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

Soft Retargeting Network for Click Through Rate Prediction.
CoRR, 2022

Adversarial Filtering Modeling on Long-term User Behavior Sequences for Click-Through Rate Prediction.
CoRR, 2022

A Machine Learning Approach for Automated Filling of Data Entry Forms.
CoRR, 2022

Detecting Simulink compiler bugs via controllable zombie blocks mutation.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

Adversarial Filtering Modeling on Long-term User Behavior Sequences for Click-Through Rate Prediction.
Proceedings of the SIGIR '22: The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, Madrid, Spain, July 11, 2022

Remgen: Remanufacturing a Random Program Generator for Compiler Testing.
Proceedings of the IEEE 33rd International Symposium on Software Reliability Engineering, 2022

Automated Patching for Unreproducible Builds.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

EFSM Model Construction Method for RTL Digital Circuit.
Proceedings of the 9th International Conference on Dependable Systems and Their Applications, 2022

2021
An AI-based Approach for Tracing Content Requirements in Financial Documents.
CoRR, 2021

Toward accurate detection on change barriers.
Sci. China Inf. Sci., 2021

Modelling and Simulation on Stopping Motion Based on Propeller C-Series in Maritime Simulator.
Proceedings of the 2021 International Symposium on Computer Science and Intelligent Control, 2021

Research on Optimization of Target Ship System in Ship Handling Simulator.
Proceedings of the 5th International Conference on Vision, Image and Signal Processing, 2021

Multi-objective Evolutionary Algorithm for String SMT Solver Testing.
Proceedings of the 8th International Conference on Dependable Systems and Their Applications, 2021

2020
Bridging Semantic Gaps between Natural Languages and APIs with Word Embedding.
IEEE Trans. Software Eng., 2020

Secrecy transmission capacity in mobile <i>ad hoc</i> networks with security-aware Aloha protocol.
IET Commun., 2020

A systemic framework for crowdsourced test report quality assessment.
Empir. Softw. Eng., 2020

DUMP: A Dummy-Point-Based Framework for Histogram Estimation in Shuffle Model.
CoRR, 2020

Many-Objective Test Database Generation for SQL.
Proceedings of the Parallel Problem Solving from Nature - PPSN XVI, 2020

Loss Constrains Added Squeeze and Excitation Blocks for Pruning Deep Neural Networks.
Proceedings of the 16th International Conference on Control, 2020

AGAMI: Scalable Visual Analytics over Multidimensional Data Streams.
Proceedings of the 7th IEEE/ACM International Conference on Big Data Computing, 2020

2019
Toward Better Summarizing Bug Reports With Crowdsourcing Elicited Attributes.
IEEE Trans. Reliab., 2019

Recommending New Features from Mobile App Descriptions.
ACM Trans. Softw. Eng. Methodol., 2019

2018
Fuzzy Clustering of Crowdsourced Test Reports for Apps.
ACM Trans. Internet Techn., 2018

Towards Better Summarizing Bug Reports with Crowdsourcing Elicited Attributes.
CoRR, 2018

Deep Learning in Software Engineering.
CoRR, 2018

Exact secrecy throughput capacity study in mobile ad hoc networks.
Ad Hoc Networks, 2018

Automated quality assessment for crowdsourced test reports of mobile applications.
Proceedings of the 25th International Conference on Software Analysis, 2018

Unsupervised deep bug report summarization.
Proceedings of the 26th Conference on Program Comprehension, 2018

Solving team making problem for crowdsourcing with hybrid metaheuristic algorithm.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2018

Solving Team Making Problem for Crowdsourcing with Evolutionary Strategy.
Proceedings of the 5th International Conference on Dependable Systems and Their Applications, 2018

How Are Issue Units Linked? Empirical Study on the Linking Behavior in GitHub.
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018

2017
Secure Transmission with Limited Feedback in MISOME Wiretap Channels.
Proceedings of the International Conference on Networking and Network Applications, 2017

Philosophical Principles of Data Discovery.
Proceedings of the Computer and Computing Technologies in Agriculture XI, 2017

What causes my test alarm?: automatic cause analysis for test alarms in system and integration testing.
Proceedings of the 39th International Conference on Software Engineering, 2017

Secure Beamforming for Full-Duplex MIMO Two-Way Communication via Untrusted Relaying.
Proceedings of the 2017 IEEE Globecom Workshops, Singapore, December 4-8, 2017, 2017

2016
Query Expansion Based on Crowd Knowledge for Code Search.
IEEE Trans. Serv. Comput., 2016

Source code fragment summarization with small-scale crowdsourcing based features.
Frontiers Comput. Sci., 2016

A More Accurate Model for Finding Tutorial Segments Explaining APIs.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

Exact Secrecy Throughput of MANETs with Guard Zone.
Proceedings of the International Conference on Networking and Network Applications, 2016

Study on the Theory and Practice of Data Visualization.
Proceedings of the Computer and Computing Technologies in Agriculture X, 2016

2015
An ACP-Based Approach to Intelligence and Security Informatics.
Proceedings of the Intelligent Methods for Cyber Warfare, 2015

Energy-Efficient Group Key Agreement for Wireless Networks.
IEEE Trans. Wirel. Commun., 2015

面向软件仓库挖掘的数据驱动特征提取方法 (Data Driven Feature Extraction for Mining Software Repositories).
计算机科学, 2015

Transformed Search Based Software Engineering: A New Paradigm of SBSE.
Proceedings of the Search-Based Software Engineering - 7th International Symposium, 2015

A critique of HF NVIS channel models.
Proceedings of the 34th IEEE Military Communications Conference, 2015

A bottom-up method for constructing topic hierarchies.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

MB-DDIVR: A Map-Based Dynamic Data Integrity Verification and Recovery Scheme in Cloud Storage.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

2014
RED theory for quality of service provisioning in wireless communications.
Wirel. Commun. Mob. Comput., 2014

What makes a good app description?
Proceedings of the 6th Asia-Pacific Symposium on Internetware, 2014

2013
Recursive maximum likelihood estimation of time-varying carrier frequency offset for orthogonal frequency-division multiplexing systems.
Wirel. Commun. Mob. Comput., 2013

2012
Queue length aware power control for delay- constrained communication over fading channels.
Wirel. Commun. Mob. Comput., 2012

Forecasting complex group behavior via multiple plan recognition.
Frontiers Comput. Sci. China, 2012

Probabilistic Plan Inference for Group Behavior Prediction.
IEEE Intell. Syst., 2012

Acquiring netizen group's opinions for modeling food safety events.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

An improved iterative channel estimation based LTE Downlink.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

A New Balancing Type of Wireless Sensor Network Routing Algorithm.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2012

2011
Hierarchical queue-length-aware power control for real-time applications over wireless networks.
Wirel. Commun. Mob. Comput., 2011

Power control for delay constrained multi-channel communications using outdated CSI.
Wirel. Commun. Mob. Comput., 2011

On Optimal Power Control for Delay-Constrained Communication Over Fading Channels.
IEEE Trans. Inf. Theory, 2011

From Causal Scenarios to Social Causality: An Attributional Approach.
IEEE Intell. Syst., 2011

Agent-Based Modeling of Netizen Groups in Chinese Internet Events.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2011

Forecasting group behavior via multiple plan recognition.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

2010
A TDMA-based MAC protocol with cooperative diversity.
IEEE Commun. Lett., 2010

Automatic construction of domain theory for attack planning.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2010

Reinforcement learning based adaptive rate control for delay-constrained communications over fading channels.
Proceedings of the International Joint Conference on Neural Networks, 2010

An integrated incremental self-organizing map and hierarchical neural network approach for cognitive radio learning.
Proceedings of the International Joint Conference on Neural Networks, 2010

2009
Performance Evaluation of Machine Learning Methods in Cultural Modeling.
J. Comput. Sci. Technol., 2009

Handling Class Imbalance Problem in Cultural Modeling.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

Performance evaluation of classification methods in cultural modeling.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

QoS-Driven Power Allocation for Multi-Channel Communication under Delayed Channel Side Information.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

Analysis of Packet Error Probability in Delay Constrained Communication Over Fading Channels.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
Power control and channel allocation for real-time applications in cellular networks.
Wirel. Commun. Mob. Comput., 2008

Agent-Based Social Simulation and Modeling in Social Computing.
Proceedings of the Intelligence and Security Informatics, 2008

Searching XML Documents by Keywords in Structured P2P Networks.
Proceedings of the 19th International Workshop on Database and Expert Systems Applications (DEXA 2008), 2008

2006
Ad-hoc distributed spatial joins on mobile devices.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

Power Control and Dynamic Channel Allocation for Delay Sensitive Applications in Wireless Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2003
Optimization of Spatial Joins on Mobile Devices.
Proceedings of the Advances in Spatial and Temporal Databases, 8th International Symposium, 2003


  Loading...