![](https://dblp.uni-trier.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Xiaoxue Ma
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
![note](https://dblp.uni-trier.de/img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j33]Xiaoxue Ma, Huiqi Zou, Pinjia He, Jacky Keung, Yishu Li, Xiao Yu, Federica Sarro:
On the Influence of Data Resampling for Deep Learning-Based Log Anomaly Detection: Insights and Recommendations. IEEE Trans. Software Eng. 51(1): 243-261 (2025) - 2024
- [j32]Yishu Li
, Jacky Keung
, Zhen Yang, Xiaoxue Ma
, Jingyu Zhang
, Shuo Liu
:
SimAC: simulating agile collaboration to generate acceptance criteria in user story elaboration. Autom. Softw. Eng. 31(2): 55 (2024) - [j31]Wanyi Deng, Weiliang Qiao
, Xiaoxue Ma, Bing Han:
A novel unconstrained methodology for economic analysis of the level of repair with a case study of a multi-indenture and multi-echelon repair network. Comput. Ind. Eng. 192: 110215 (2024) - [j30]Wanyi Deng, Weiliang Qiao, Xiaoxue Ma, Bing Han:
A novel methodology to evaluate criticality and sensitivity of safety barrier based on multi-agent interaction network. Expert Syst. Appl. 244: 123001 (2024) - [j29]Zhen Yang
, Fang Liu
, Zhongxing Yu
, Jacky Wai Keung
, Jia Li
, Shuo Liu
, Yifan Hong
, Xiaoxue Ma
, Zhi Jin
, Ge Li
:
Exploring and Unleashing the Power of Large Language Models in Automated Code Translation. Proc. ACM Softw. Eng. 1(FSE): 1585-1608 (2024) - [j28]Yang Liu
, Xiaoxue Ma, Weiliang Qiao
, Laihao Ma, Bing Han:
A novel methodology to model disruption propagation for resilient maritime transportation systems-a case study of the Arctic maritime transportation system. Reliab. Eng. Syst. Saf. 241: 109620 (2024) - [j27]Wanyi Deng, Xiaoxue Ma, Weiliang Qiao
:
A novel methodology to quantify the impact of safety barriers on maritime operational risk based on a probabilistic network. Reliab. Eng. Syst. Saf. 243: 109884 (2024) - [j26]Xiaoxue Ma
, Jacky Keung
, Pinjia He
, Yan Xiao
, Xiao Yu
, Yishu Li
:
A Semisupervised Approach for Industrial Anomaly Detection via Self-Adaptive Clustering. IEEE Trans. Ind. Informatics 20(2): 1687-1697 (2024) - [j25]Jingyu Zhang
, Jacky Wai Keung
, Yan Xiao
, Yihan Liao
, Yishu Li
, Xiaoxue Ma
:
UniAda: Universal Adaptive Multiobjective Adversarial Attack for End-to-End Autonomous Driving Systems. IEEE Trans. Reliab. 73(4): 1892-1906 (2024) - [c14]Yishu Li, Jacky Keung, Xiaoxue Ma, Chun Yong Chong, Jingyu Zhang, Yihan Liao:
LLM-Based Class Diagram Derivation from User Stories with Chain-of-Thought Promptings. COMPSAC 2024: 45-50 - [c13]Yishu Li
, Jacky Keung
, Kwabena Ebo Bennin, Xiaoxue Ma
, Jingyu Zhang
, Zhen Yang:
Agile Requirements Engineering in a Distributed Environment: Experiences from the Software Industry During Unprecedented Global Challenges. COMPSAC 2024: 682-691 - [c12]Jingyu Zhang
, Jacky Keung
, Xiaoxue Ma
, Xiangyu Li, Yan Xiao, Yishu Li
, Wing Kwong Chan:
Enhancing Valid Test Input Generation with Distribution Awareness for Deep Neural Networks. COMPSAC 2024: 1095-1100 - [c11]Zexian Zhang, Shuang Yin, Wenliu Wei, Xiaoxue Ma, Jacky Wai Keung, Fuyang Li, Wenhua Hu:
Practitioners' Expectations on Code Smell Detection. COMPSAC 2024: 1324-1333 - [c10]Yanzhong He
, Guancheng Lin
, Xiaoxue Ma
, Jacky Wai Keung
, Cheng Tan
, Wenhua Hu
, Fuyang Li
:
Enhancing Deep Learning Vulnerability Detection through Imbalance Loss Functions: An Empirical Study. Internetware 2024 - [i5]Zhen Yang, Fang Liu, Zhongxing Yu, Jacky Wai Keung, Jia Li, Shuo Liu, Yifan Hong, Xiaoxue Ma, Zhi Jin, Ge Li:
Exploring and Unleashing the Power of Large Language Models in Automated Code Translation. CoRR abs/2404.14646 (2024) - [i4]Xiaoxue Ma, Huiqi Zou, Jacky Keung, Pinjia He, Yishu Li, Xiao Yu, Federica Sarro:
On the Influence of Data Resampling for Deep Learning-Based Log Anomaly Detection: Insights and Recommendations. CoRR abs/2405.03489 (2024) - [i3]Xiaoxue Ma, Yishu Li, Jacky Keung, Xiao Yu, Huiqi Zou, Zhen Yang, Federica Sarro, Earl T. Barr:
Practitioners' Expectations on Log Anomaly Detection. CoRR abs/2412.01066 (2024) - 2023
- [j24]Weihao Li, Youhong Zuo, Tao Su, Weiyou Zhao, Xiaoxue Ma
, Guangkai Cui, Jiabin Wu, Yu Song
:
Firefly Algorithm-Based Semi-Supervised Learning With Transformer Method for Shore Power Load Forecasting. IEEE Access 11: 77359-77370 (2023) - [j23]Jianfeng Han, Xuefei Guo, Runcheng Jiao, Yun Nan, Honglei Yang
, Xuan Ni, Danning Zhao, Shengyu Wang, Xiaoxue Ma, Chi Yan, Chi Ma, Jia Zhao:
An Automatic Method for Delimiting Deformation Area in InSAR Based on HNSW-DBSCAN Clustering Algorithm. Remote. Sens. 15(17): 4287 (2023) - [j22]He Lan
, Xiaoxue Ma, Laihao Ma, Weiliang Qiao:
Pattern investigation of total loss maritime accidents based on association rule mining. Reliab. Eng. Syst. Saf. 229: 108893 (2023) - [j21]He Lan
, Xiaoxue Ma, Weiliang Qiao, Wanyi Deng:
Determining the critical risk factors for predicting the severity of ship collision accidents using a data-driven approach. Reliab. Eng. Syst. Saf. 230: 108934 (2023) - [j20]Xiaoxue Ma, Liguang Chen, Weijie Wu, Yang Liu, Weiliang Qiao
, Laihao Ma:
Comparative Analysis of Arctic-Related Strategies at the National Level: Competition and Collaboration. Syst. 11(8): 413 (2023) - [j19]Xiaoxue Ma
, Imran Ashraf
, W. K. Chan
:
Davida: A Decentralization Approach to Localizing Transaction Sequences for Debugging Transactional Atomicity Violations. IEEE Trans. Reliab. 72(2): 808-826 (2023) - [j18]Xiaoxue Ma
, Jacky Wai Keung
, Xiao Yu
, Huiqi Zou
, Jingyu Zhang
, Yishu Li
:
AttSum: A Deep Attention-Based Summarization Model for Bug Report Title Generation. IEEE Trans. Reliab. 72(4): 1663-1677 (2023) - [j17]Xiaoxue Ma, Yun Li, Yan Gao
:
Decision model of intrusion response based on markov game in fog computing environment. Wirel. Networks 29(8): 3383-3392 (2023) - [c9]Yishu Li
, Jacky Keung
, Kwabena Ebo Bennin, Xiaoxue Ma
, Yangyang Huang, Jingyu Zhang
:
Towards Requirements Engineering Activities for Machine Learning-Enabled FinTech Applications. APSEC 2023: 121-130 - 2022
- [j16]Xiaoxue Ma
, Jacky Keung
, Zhen Yang
, Xiao Yu
, Yishu Li
, Hao Zhang
:
CASMS: Combining clustering with attention semantic model for identifying security bug reports. Inf. Softw. Technol. 147: 106906 (2022) - [j15]Xiaoxue Ma, Wanyi Deng, Weiliang Qiao, He Lan:
A methodology to quantify the risk propagation of hazardous events for ship grounding accidents based on directed CN. Reliab. Eng. Syst. Saf. 221: 108334 (2022) - [j14]He Lan
, Xiaoxue Ma, Weiliang Qiao, Laihao Ma:
On the causation of seafarers' unsafe acts using grounded theory and association rule. Reliab. Eng. Syst. Saf. 223: 108498 (2022) - 2021
- [j13]Xiupei Mei
, Imran Ashraf
, Xiaoxue Ma
, Hao Zhang
, Zhengyuan Wei
, Haipeng Wang
, W. K. Chan
:
Execution Repair for Spark Programs by Active Maintenance of Partition Dependency. IEEE Access 9: 101555-101573 (2021) - [j12]Wanqing Wu, Xiaoxue Ma:
Multi-party quantum summation without a third party based on d-dimensional bell states. Quantum Inf. Process. 20(6): 200 (2021) - [j11]Xiaoxue Ma
, Shangru Wu, Ernest Bota Pobee
, Xiupei Mei
, Hao Zhang, Bo Jiang, Wing Kwong Chan:
RegionTrack: A Trace-Based Sound and Complete Checker to Debug Transactional Atomicity Violations and Non-Serializable Traces. ACM Trans. Softw. Eng. Methodol. 30(1): 7:1-7:49 (2021) - [c8]Zhen Yang
, Jacky Keung
, Xiao Yu, Xiaodong Gu
, Zhengyuan Wei
, Xiaoxue Ma
, Miao Zhang
:
A Multi-Modal Transformer-based Code Summarization Approach for Smart Contracts. ICPC 2021: 1-12 - [c7]Xiaoxue Ma
, Imran Ashraf
, W. K. Chan:
Sound Predictive Atomicity Violation Detection§. QRS 2021: 114-125 - [c6]Chunbai Yang, Imran Ashraf
, Xiaoxue Ma
, Hao Zhang
, W. K. Chan:
OPE: Transforming Programs with Clean and Precise Separation of Tested Intraprocedural Program Paths with Path Profiling. QRS 2021: 279-290 - [i2]Zhen Yang, Jacky Keung, Xiao Yu, Xiaodong Gu, Zhengyuan Wei, Xiaoxue Ma, Miao Zhang:
A Multi-Modal Transformer-based Code Summarization Approach for Smart Contracts. CoRR abs/2103.07164 (2021) - 2020
- [j10]Imran Ashraf
, Xiaoxue Ma
, Bo Jiang, Wing Kwong Chan:
GasFuzzer: Fuzzing Ethereum Smart Contract Binaries to Expose Gas-Oriented Exception Security Vulnerabilities. IEEE Access 8: 99552-99564 (2020) - [j9]Xiaoxue Ma
, Jun Shen
, Yang Liu
, Weiliang Qiao
:
A Methodology to Evaluate the Effectiveness of Intelligent Ship Navigational Information Monitoring System. IEEE Access 8: 193544-193559 (2020) - [j8]Xiaoxue Ma, Pengliang Shi:
Dynamic multiple copies adaptive audit scheme based on DITS. Int. J. Comput. Sci. Eng. 23(1): 82-90 (2020) - [c5]Xiaoxue Ma, Zhonggang Li:
Combination of Information Technology and College English in the Age of Media. ATCI 2020: 875-881 - [i1]Xiaoxue Ma, Shangru Wu, Ernest Bota Pobee, Xiupei Mei, Hao Zhang, Bo Jiang, Wing Kwong Chan:
RegionTrack: A Trace-based Sound and Complete Checker to Debug Transactional Atomicity Violations and Non-Serializable Traces. CoRR abs/2008.04479 (2020)
2010 – 2019
- 2019
- [c4]Xiaoxue Ma, Hui Zhang, Yanyun Fu, Yiping Zeng, Danhuai Guo, Yang Gao:
Discentralized human movement control and management for campus safety. EM-GIS 2019: 2:1-2:6 - [c3]Yang Gao, Hui Zhang, Lei Xiao, Yanyun Fu, Xiaoxue Ma:
Spatial and temporal distribution of LPG dispersion concentration in small-scale space. EM-GIS 2019: 3:1-3:8 - [c2]Yanyun Fu, Wenxi Shi, Hui Zhang, Xiaoxue Ma, Yang Gao, Danhuai Guo:
Path optimization of integrating crowd model and reinforcement learning. EM-GIS 2019: 11:1-11:6 - 2018
- [j7]Junfeng Tian, Jiayao Zhang, Zhang Peipei, Xiaoxue Ma:
Dynamic Trust Model Based on Extended Subjective Logic. KSII Trans. Internet Inf. Syst. 12(8): 3926-3945 (2018) - 2017
- [j6]Suhanya Jayaprakasam
, Xiaoxue Ma
, Jun Won Choi
, Sunwoo Kim:
Robust Beam-Tracking for mmWave Mobile Communications. IEEE Commun. Lett. 21(12): 2654-2657 (2017) - [j5]Lei Ma, Tengyu Fu, Thomas Blaschke
, Manchun Li, Dirk Tiede
, Zhenjin Zhou, Xiaoxue Ma, Deliang Chen:
Evaluation of Feature Selection Methods for Object-Based Land Cover Mapping of Unmanned Aerial Vehicle Imagery Using Random Forest and Support Vector Machine Classifiers. ISPRS Int. J. Geo Inf. 6(2): 51 (2017) - [j4]Lei Ma, Manchun Li, Yu Gao, Tan Chen, Xiaoxue Ma, Lean Qu:
A Novel Wrapper Approach for Feature Selection in Object-Based Image Classification Using Polygon-Based Cross-Validation. IEEE Geosci. Remote. Sens. Lett. 14(3): 409-413 (2017) - 2016
- [j3]Lei Ma
, Manchun Li, Thomas Blaschke
, Xiaoxue Ma, Dirk Tiede
, Liang Cheng, Zhenjie Chen
, Dong Chen:
Object-Based Change Detection in Urban Areas: The Effects of Segmentation Strategy, Scale, and Feature Space on Unsupervised Methods. Remote. Sens. 8(9): 761 (2016) - 2011
- [j2]Xiaoxue Ma, Zixian Wang, Ruizhong Du:
Trust Evaluation Model based on Multiple Service Attributes. J. Networks 6(6): 842-849 (2011) - [j1]Ruizhong Du, Xiaoxue Ma:
Trust Evaluation Model based on Service Satisfaction. J. Softw. 6(10): 2001-2008 (2011) - 2010
- [c1]Ruizhong Du, Xiaoxue Ma, Zixian Wang:
Dynamic Trust Model Based on Perceived Risk. ICEE 2010: 2037-2040
Coauthor Index
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-14 02:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint