Ya Xiao
Orcid: 0000-0002-9190-3998
According to our database1,
Ya Xiao
authored at least 48 papers
between 2018 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2018
2019
2020
2021
2022
2023
2024
0
5
10
4
6
5
5
1
6
3
1
1
4
2
4
5
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Software Eng., May, 2024
ACM Trans. Softw. Eng. Methodol., March, 2024
Intangible rewards versus tangible rewards in gamified online learning: Which promotes student intrinsic motivation, behavioural engagement, cognitive engagement and learning performance?
Br. J. Educ. Technol., January, 2024
Pathways to digital reading literacy among secondary school students: A multilevel analysis using data from 31 economies.
Comput. Educ., 2024
Investigating the Implementation and Effects of Personalized Gamification in Education.
Proceedings of the Companion Proceedings of the 2024 Annual Symposium on Computer-Human Interaction in Play, 2024
2023
IEEE Trans. Software Eng., June, 2023
Dynamic Modelling and Numerical Simulation of Formation Control for Intelligent Multi-agent System with Target Geometric Configuration.
Appl. Math. Comput., May, 2023
Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks.
IEEE Trans. Software Eng., February, 2023
IEEE Trans. Software Eng., 2023
Industrial Experience of Finding Cryptographic Vulnerabilities in Large-scale Codebases.
DTRAP, 2023
CoRR, 2023
Improving Visual-Semantic Embedding with Adaptive Pooling and Optimization Objective.
Proceedings of the 17th Conference of the European Chapter of the Association for Computational Linguistics, 2023
2022
Genome Assembly and Population Resequencing Reveal the Geographical Divergence of Shanmei (<i>Rubus corchorifolius</i>).
Genom. Proteom. Bioinform., December, 2022
Accurately quantifying the superposition state of two different Laguerre-Gaussian modes with single intensity distribution measurement.
Quantum Inf. Process., 2022
Being the Developers' Friend: Our Experience Developing a High-Precision Tool for Secure Coding.
IEEE Secur. Priv., 2022
Deep Learning-based Anomaly Detection in Cyber-physical Systems: Progress and Opportunities.
ACM Comput. Surv., 2022
Privacy Guarantees of Bluetooth Low Energy Contact Tracing: A Case Study on COVIDWISE.
Computer, 2022
Proceedings of the IEEE Secure Development Conference, 2022
Proceedings of the 30th IEEE/ACM International Conference on Program Comprehension, 2022
Poster: Comprehensive Comparisons of Embedding Approaches for Cryptographic API Completion.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2022
Privacy Guarantees of BLE Contact Tracing for COVID-19 and Beyond: A Case Study on COVIDWISE.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Sharing quantum steering among multiple Alices and Bobs via a two-qubit Werner state.
Quantum Inf. Process., 2021
J. Intell. Fuzzy Syst., 2021
Embedding Code Contexts for Cryptographic API Suggestion: New Methodologies and Comparisons.
CoRR, 2021
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021
Yunnan University at VQA-Med 2021: Pretrained BioBERT for Medical Domain Visual Question Answering.
Proceedings of the Working Notes of CLEF 2021 - Conference and Labs of the Evaluation Forum, Bucharest, Romania, September 21st - to, 2021
2020
Heterogeneous Identity Expression and Association Method Based on Attribute Aggregation "In Prepress".
J. Web Eng., 2020
Proceedings of the IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, 2020
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Joint Entity and Relation Extraction with a Hybrid Transformer and Reinforcement Learning Based Model.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
An improved network security situation assessment approach in software defined networks.
Peer-to-Peer Netw. Appl., 2019
Discovery method for distributed denial-of-service attack behavior in SDNs using a feature-pattern graph model.
Frontiers Inf. Technol. Electron. Eng., 2019
The Moderation Examination of ICT Use on the Association Between Chinese Mainland Students' Socioeconomic Status and Reading Achievement.
Int. J. Emerg. Technol. Learn., 2019
Decentralized attribute-based conjunctive keyword search scheme with online/offline encryption and outsource decryption for cloud computing.
Future Gener. Comput. Syst., 2019
CoRR, 2019
Comparative Measurement of Cache Configurations' Impacts on Cache Timing Side-Channel Attacks.
Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test, 2019
The influence of ICT attitudes on closing the reading literacy gap of students from different economic, social and cultural backgrounds.
Proceedings of the 14th International Conference on Computer Science & Education, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Poster: Deployment-quality and Accessible Solutions for Cryptography Code Development.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.
Sensors, 2018
CoRR, 2018
Secure Multi-Authority Data Access Control Scheme in Cloud Storage System Based on Attribute-Based Signcryption.
IEEE Access, 2018