Xiaoxue Ma

Orcid: 0000-0002-5476-6074

According to our database1, Xiaoxue Ma authored at least 46 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SimAC: simulating agile collaboration to generate acceptance criteria in user story elaboration.
Autom. Softw. Eng., November, 2024

A novel methodology to quantify the impact of safety barriers on maritime operational risk based on a probabilistic network.
Reliab. Eng. Syst. Saf., March, 2024

A Semisupervised Approach for Industrial Anomaly Detection via Self-Adaptive Clustering.
IEEE Trans. Ind. Informatics, February, 2024

A novel methodology to model disruption propagation for resilient maritime transportation systems-a case study of the Arctic maritime transportation system.
Reliab. Eng. Syst. Saf., January, 2024

Exploring and Unleashing the Power of Large Language Models in Automated Code Translation.
Proc. ACM Softw. Eng., 2024

A novel methodology to evaluate criticality and sensitivity of safety barrier based on multi-agent interaction network.
Expert Syst. Appl., 2024

On the Influence of Data Resampling for Deep Learning-Based Log Anomaly Detection: Insights and Recommendations.
CoRR, 2024

A novel unconstrained methodology for economic analysis of the level of repair with a case study of a multi-indenture and multi-echelon repair network.
Comput. Ind. Eng., 2024

Enhancing Deep Learning Vulnerability Detection through Imbalance Loss Functions: An Empirical Study.
Proceedings of the 15th Asia-Pacific Symposium on Internetware, 2024

Practitioners' Expectations on Code Smell Detection.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024

Enhancing Valid Test Input Generation with Distribution Awareness for Deep Neural Networks.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024

LLM-Based Class Diagram Derivation from User Stories with Chain-of-Thought Promptings.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024

Agile Requirements Engineering in a Distributed Environment: Experiences from the Software Industry During Unprecedented Global Challenges.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024

2023
AttSum: A Deep Attention-Based Summarization Model for Bug Report Title Generation.
IEEE Trans. Reliab., December, 2023

Decision model of intrusion response based on markov game in fog computing environment.
Wirel. Networks, November, 2023

An Automatic Method for Delimiting Deformation Area in InSAR Based on HNSW-DBSCAN Clustering Algorithm.
Remote. Sens., September, 2023

Comparative Analysis of Arctic-Related Strategies at the National Level: Competition and Collaboration.
Syst., August, 2023

Davida: A Decentralization Approach to Localizing Transaction Sequences for Debugging Transactional Atomicity Violations.
IEEE Trans. Reliab., 2023

Determining the critical risk factors for predicting the severity of ship collision accidents using a data-driven approach.
Reliab. Eng. Syst. Saf., 2023

Pattern investigation of total loss maritime accidents based on association rule mining.
Reliab. Eng. Syst. Saf., 2023

Firefly Algorithm-Based Semi-Supervised Learning With Transformer Method for Shore Power Load Forecasting.
IEEE Access, 2023

Towards Requirements Engineering Activities for Machine Learning-Enabled FinTech Applications.
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023

2022
A methodology to quantify the risk propagation of hazardous events for ship grounding accidents based on directed CN.
Reliab. Eng. Syst. Saf., 2022

On the causation of seafarers' unsafe acts using grounded theory and association rule.
Reliab. Eng. Syst. Saf., 2022

CASMS: Combining clustering with attention semantic model for identifying security bug reports.
Inf. Softw. Technol., 2022

2021
RegionTrack: A Trace-Based Sound and Complete Checker to Debug Transactional Atomicity Violations and Non-Serializable Traces.
ACM Trans. Softw. Eng. Methodol., 2021

Multi-party quantum summation without a third party based on d-dimensional bell states.
Quantum Inf. Process., 2021

Execution Repair for Spark Programs by Active Maintenance of Partition Dependency.
IEEE Access, 2021

OPE: Transforming Programs with Clean and Precise Separation of Tested Intraprocedural Program Paths with Path Profiling.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

Sound Predictive Atomicity Violation Detection§.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

A Multi-Modal Transformer-based Code Summarization Approach for Smart Contracts.
Proceedings of the 29th IEEE/ACM International Conference on Program Comprehension, 2021

2020
Dynamic multiple copies adaptive audit scheme based on DITS.
Int. J. Comput. Sci. Eng., 2020

A Methodology to Evaluate the Effectiveness of Intelligent Ship Navigational Information Monitoring System.
IEEE Access, 2020

GasFuzzer: Fuzzing Ethereum Smart Contract Binaries to Expose Gas-Oriented Exception Security Vulnerabilities.
IEEE Access, 2020

Combination of Information Technology and College English in the Age of Media.
Proceedings of the 2020 International Conference on Applications and Techniques in Cyber Intelligence, 2020

2019
Discentralized human movement control and management for campus safety.
Proceedings of the EM-GIS '19: Proceedings of the 5th ACM SIGSPATIAL International Workshop on the Use of GIS in Emergency Management Chicago, 2019

Spatial and temporal distribution of LPG dispersion concentration in small-scale space.
Proceedings of the EM-GIS '19: Proceedings of the 5th ACM SIGSPATIAL International Workshop on the Use of GIS in Emergency Management Chicago, 2019

Path optimization of integrating crowd model and reinforcement learning.
Proceedings of the EM-GIS '19: Proceedings of the 5th ACM SIGSPATIAL International Workshop on the Use of GIS in Emergency Management Chicago, 2019

2018
Dynamic Trust Model Based on Extended Subjective Logic.
KSII Trans. Internet Inf. Syst., 2018

2017
A Novel Wrapper Approach for Feature Selection in Object-Based Image Classification Using Polygon-Based Cross-Validation.
IEEE Geosci. Remote. Sens. Lett., 2017

Evaluation of Feature Selection Methods for Object-Based Land Cover Mapping of Unmanned Aerial Vehicle Imagery Using Random Forest and Support Vector Machine Classifiers.
ISPRS Int. J. Geo Inf., 2017

Robust Beam-Tracking for mmWave Mobile Communications.
IEEE Commun. Lett., 2017

2016
Object-Based Change Detection in Urban Areas: The Effects of Segmentation Strategy, Scale, and Feature Space on Unsupervised Methods.
Remote. Sens., 2016

2011
Trust Evaluation Model based on Service Satisfaction.
J. Softw., 2011

Trust Evaluation Model based on Multiple Service Attributes.
J. Networks, 2011

2010
Dynamic Trust Model Based on Perceived Risk.
Proceedings of the International Conference on E-Business and E-Government, 2010


  Loading...