default search action
Ya Xiao
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Ya Xiao, Khe Foon Timothy Hew:
Intangible rewards versus tangible rewards in gamified online learning: Which promotes student intrinsic motivation, behavioural engagement, cognitive engagement and learning performance? Br. J. Educ. Technol. 55(1): 297-317 (2024) - [j23]Xueliang Chen, Ya Xiao:
Pathways to digital reading literacy among secondary school students: A multilevel analysis using data from 31 economies. Comput. Educ. 218: 105090 (2024) - [j22]Ya Xiao, Wenjia Song, Salman Ahmed, Xinyang Ge, Bimal Viswanath, Na Meng, Danfeng (Daphne) Yao:
Measurement of Embedding Choices on Cryptographic API Completion Tasks. ACM Trans. Softw. Eng. Methodol. 33(3): 56:1-56:30 (2024) - [j21]Miles Frantz, Ya Xiao, Tanmoy Sarkar Pias, Na Meng, Danfeng Yao:
Methods and Benchmark for Detecting Cryptographic API Misuses in Python. IEEE Trans. Software Eng. 50(5): 1118-1129 (2024) - [c17]Ya Xiao:
Investigating the Implementation and Effects of Personalized Gamification in Education. CHI PLAY (Companion) 2024: 454-457 - 2023
- [j20]Ya Xiao, Linhua Zhou:
Dynamic Modelling and Numerical Simulation of Formation Control for Intelligent Multi-agent System with Target Geometric Configuration. Appl. Math. Comput. 444: 127826 (2023) - [j19]Ya Xiao, Yang Zhao, Nicholas Allen, Nathan Keynes, Danfeng (Daphne) Yao, Cristina Cifuentes:
Industrial Experience of Finding Cryptographic Vulnerabilities in Large-scale Codebases. DTRAP 4(1): 4:1-4:18 (2023) - [j18]Ying Zhang, Md Mahir Asef Kabir, Ya Xiao, Danfeng Yao, Na Meng:
Automatic Detection of Java Cryptographic API Misuses: Are We There Yet? IEEE Trans. Software Eng. 49(1): 288-303 (2023) - [j17]Sharmin Afrose, Ya Xiao, Sazzadur Rahaman, Barton P. Miller, Danfeng Yao:
Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks. IEEE Trans. Software Eng. 49(2): 485-497 (2023) - [j16]Ya Xiao, Wenjia Song, Jingyuan Qi, Bimal Viswanath, Patrick D. McDaniel, Danfeng Yao:
Specializing Neural Networks for Cryptographic Code Completion Applications. IEEE Trans. Software Eng. 49(6): 3524-3535 (2023) - [c16]Zijian Zhang, Chang Shu, Ya Xiao, Yuan Shen, Di Zhu, Youxin Chen, Jing Xiao, Jey Han Lau, Qian Zhang, Zheng Lu:
Improving Visual-Semantic Embedding with Adaptive Pooling and Optimization Objective. EACL 2023: 1209-1221 - [i12]Wenjia Song, Sanjula Karanam, Ya Xiao, Jingyuan Qi, Nathan Dautenhahn, Na Meng, Danfeng Yao:
Crypto-ransomware Detection through Quantitative API-based Behavioral Profiling. CoRR abs/2306.02270 (2023) - 2022
- [b1]Ya Xiao:
Neural Network-based Methodologies for Securing Cryptographic Code. Virginia Tech, Blacksburg, VA, USA, 2022 - [j15]Salman Ahmed, Ya Xiao, Taejoong Chung, Carol J. Fung, Moti Yung, Danfeng Daphne Yao:
Privacy Guarantees of Bluetooth Low Energy Contact Tracing: A Case Study on COVIDWISE. Computer 55(2): 54-62 (2022) - [j14]Yuan Luo, Ya Xiao, Long Cheng, Guojun Peng, Danfeng (Daphne) Yao:
Deep Learning-based Anomaly Detection in Cyber-physical Systems: Progress and Opportunities. ACM Comput. Surv. 54(5): 106:1-106:36 (2022) - [j13]Yinqing Yang, Kang Zhang, Ya Xiao, Lingkui Zhang, Yile Huang, Xing Li, Shumin Chen, Yansong Peng, Shuhua Yang, Yongbo Liu, Feng Cheng:
Genome Assembly and Population Resequencing Reveal the Geographical Divergence of Shanmei (Rubus corchorifolius). Genom. Proteom. Bioinform. 20(6): 1106-1118 (2022) - [j12]Danfeng Daphne Yao, Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Miles Frantz, Ke Tian, Na Meng, Cristina Cifuentes, Yang Zhao, Nicholas Allen, Nathan Keynes, Barton P. Miller, Elisa Heymann, Murat Kantarcioglu, Fahad Shaon:
Being the Developers' Friend: Our Experience Developing a High-Precision Tool for Secure Coding. IEEE Secur. Priv. 20(6): 43-52 (2022) - [j11]Ya Xiao, Haida Liu, Yuewei Song, Qizhi HanZhao, Fengheng Che, Xuan Fan, Xinhong Han, Huichao Qu, Weichen Li, Wendong Li, Yongjian Gu:
Accurately quantifying the superposition state of two different Laguerre-Gaussian modes with single intensity distribution measurement. Quantum Inf. Process. 21(3): 90 (2022) - [c15]Salman Ahmed, Ya Xiao, Taejoong (Tijay) Chung, Carol J. Fung, Moti Yung, Danfeng (Daphne) Yao:
Privacy Guarantees of BLE Contact Tracing for COVID-19 and Beyond: A Case Study on COVIDWISE. AsiaCCS 2022: 1210-1212 - [c14]Ya Xiao, Salman Ahmed, Xinyang Ge, Bimal Viswanath, Na Meng, Danfeng Daphne Yao:
Poster: Comprehensive Comparisons of Embedding Approaches for Cryptographic API Completion. ICSE-Companion 2022: 360-361 - [c13]Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Danfeng (Daphne) Yao, Na Meng:
Example-based vulnerability detection and repair in Java code. ICPC 2022: 190-201 - [c12]Ya Xiao, Yang Zhao, Nicholas Allen, Nathan Keynes, Danfeng Yao, Cristina Cifuentes:
Industrial Strength Static Detection for Cryptographic API Misuses. SecDev 2022: 61-62 - [i11]Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Danfeng Yao, Na Meng:
Example-Based Vulnerability Detection and Repair in Java Code. CoRR abs/2203.09009 (2022) - [i10]Zijian Zhang, Chang Shu, Ya Xiao, Yuan Shen, Di Zhu, Jing Xiao, Youxin Chen, Jey Han Lau, Qian Zhang, Zheng Lu:
Improving Visual-Semantic Embedding with Adaptive Pooling and Optimization Objective. CoRR abs/2210.02206 (2022) - 2021
- [j10]Wenye Zhu, Chengxiang Tan, Qian Xu, Ya Xiao:
Heterogeneous identity trust management method based on risk assessment. J. Intell. Fuzzy Syst. 41(3): 4691-4704 (2021) - [j9]Xinhong Han, Ya Xiao, Huichao Qu, Runhong He, Xuan Fan, Tian Qian, Yongjian Gu:
Sharing quantum steering among multiple Alices and Bobs via a two-qubit Werner state. Quantum Inf. Process. 20(8): 1-15 (2021) - [c11]Qian Xiao, Xiaobing Zhou, Ya Xiao, Kun Zhao:
Yunnan University at VQA-Med 2021: Pretrained BioBERT for Medical Domain Visual Question Answering. CLEF (Working Notes) 2021: 1405-1411 - [c10]Ya Xiao:
Multi-location cryptographic code repair with neural-network-based methodologies. ESEC/SIGSOFT FSE 2021: 1640-1644 - [i9]Ying Zhang, Mahir Kabir, Ya Xiao, Danfeng Yao, Na Meng:
Data-Driven Vulnerability Detection and Repair in Java Code. CoRR abs/2102.06994 (2021) - [i8]Ya Xiao, Salman Ahmed, Wenjia Song, Xinyang Ge, Bimal Viswanath, Danfeng Yao:
Embedding Code Contexts for Cryptographic API Suggestion: New Methodologies and Comparisons. CoRR abs/2103.08747 (2021) - [i7]Salman Ahmed, Ya Xiao, Taejoong Chung, Carol J. Fung, Moti Yung, Danfeng Yao:
Privacy Guarantees of BLE Contact Tracing: A Case Study on COVIDWISE. CoRR abs/2111.08842 (2021) - [i6]Sharmin Afrose, Ya Xiao, Sazzadur Rahaman, Barton P. Miller, Danfeng Yao:
Evaluation of Static Vulnerability Detection Tools with Java Cryptographic API Benchmarks. CoRR abs/2112.04037 (2021) - 2020
- [j8]Wenye Zhu, Chengxiang Tan, Qian Xu, Ya Xiao:
Heterogeneous Identity Expression and Association Method Based on Attribute Aggregation "In Prepress". J. Web Eng. 19(7-8): 284-302 (2020) - [c9]Ya Xiao, Chengxiang Tan, Zhijie Fan, Qian Xu, Wenye Zhu:
Joint Entity and Relation Extraction with a Hybrid Transformer and Reinforcement Learning Based Model. AAAI 2020: 9314-9321 - [c8]Salman Ahmed, Ya Xiao, Kevin Z. Snow, Gang Tan, Fabian Monrose, Danfeng (Daphne) Yao:
Methodologies for Quantifying (Re-)randomization Security and Timing under JIT-ROP. CCS 2020: 1803-1820 - [c7]Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Ke Tian, Miles Frantz, Na Meng, Barton P. Miller, Fahad Shaon, Murat Kantarcioglu, Danfeng (Daphne) Yao:
Deployment-quality and Accessible Solutions for Cryptography Code Development. CODASPY 2020: 174-176 - [c6]Ya Xiao, Miles Frantz, Sharmin Afrose, Sazzadur Rahaman, Danfeng Daphne Yao:
Tutorial: Principles and Practices of Secure Cryptographic Coding in Java. SecDev 2020: 5-6 - [i5]Yuan Luo, Ya Xiao, Long Cheng, Guojun Peng, Danfeng Daphne Yao:
Deep Learning-Based Anomaly Detection in Cyber-Physical Systems: Progress and Opportunities. CoRR abs/2003.13213 (2020) - [i4]Ya Xiao, Yang Zhao, Nicholas Allen, Nathan Keynes, Danfeng Yao, Cristina Cifuentes:
Industrial Experience of Finding Cryptographic Vulnerabilities in Large-scale Codebases. CoRR abs/2007.06122 (2020)
2010 – 2019
- 2019
- [j7]Ya Xiao, Zhijie Fan, Chengxiang Tan, Qian Xu, Wenye Zhu, Fujia Cheng:
Sense-Based Topic Word Embedding Model for Item Recommendation. IEEE Access 7: 44748-44760 (2019) - [j6]Qian Xu, Chengxiang Tan, Wenye Zhu, Ya Xiao, Zhijie Fan, Fujia Cheng:
Decentralized attribute-based conjunctive keyword search scheme with online/offline encryption and outsource decryption for cloud computing. Future Gener. Comput. Syst. 97: 306-326 (2019) - [j5]Ya Xiao, Jie Hu:
The Moderation Examination of ICT Use on the Association Between Chinese Mainland Students' Socioeconomic Status and Reading Achievement. Int. J. Emerg. Technol. Learn. 14(15): 107-120 (2019) - [j4]Ya Xiao, Zhijie Fan, Amiya Nayak, Chengxiang Tan:
Discovery method for distributed denial-of-service attack behavior in SDNs using a feature-pattern graph model. Frontiers Inf. Technol. Electron. Eng. 20(9): 1195-1208 (2019) - [j3]Zhijie Fan, Ya Xiao, Amiya Nayak, Chengxiang Tan:
An improved network security situation assessment approach in software defined networks. Peer-to-Peer Netw. Appl. 12(2): 295-309 (2019) - [c5]Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Fahad Shaon, Ke Tian, Miles Frantz, Murat Kantarcioglu, Danfeng (Daphne) Yao:
CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects. CCS 2019: 2455-2472 - [c4]Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Ke Tian, Miles Frantz, Na Meng, Barton P. Miller, Fahad Shaon, Murat Kantarcioglu, Danfeng (Daphne) Yao:
Poster: Deployment-quality and Accessible Solutions for Cryptography Code Development. CCS 2019: 2545-2547 - [c3]Ya Xiao, Qingying Hao, Danfeng Daphne Yao:
Neural Cryptanalysis: Metrics, Methodology, and Applications in CPS Ciphers. DSC 2019: 1-8 - [c2]Ya Xiao, Jie Hu:
The influence of ICT attitudes on closing the reading literacy gap of students from different economic, social and cultural backgrounds. ICCSE 2019: 60-64 - [c1]Xiaodong Yu, Ya Xiao, Kirk W. Cameron, Danfeng (Daphne) Yao:
Comparative Measurement of Cache Configurations' Impacts on Cache Timing Side-Channel Attacks. CSET @ USENIX Security Symposium 2019 - [i3]Salman Ahmed, Ya Xiao, Gang Tan, Kevin Z. Snow, Fabian Monrose, Danfeng Yao:
Measuring Attack Surface Reduction in the Presence of Code (Re-)Randomization. CoRR abs/1910.03034 (2019) - [i2]Ya Xiao, Qingying Hao, Danfeng Yao:
Neural Cryptanalysis: Metrics, Methodology, and Applications in CPS Ciphers. CoRR abs/1911.04020 (2019) - 2018
- [j2]Qian Xu, Chengxiang Tan, Zhijie Fan, Wenye Zhu, Ya Xiao, Fujia Cheng:
Secure Multi-Authority Data Access Control Scheme in Cloud Storage System Based on Attribute-Based Signcryption. IEEE Access 6: 34051-34074 (2018) - [j1]Qian Xu, Chengxiang Tan, Zhijie Fan, Wenye Zhu, Ya Xiao, Fujia Cheng:
Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation. Sensors 18(5): 1609 (2018) - [i1]Sazzadur Rahaman, Ya Xiao, Ke Tian, Fahad Shaon, Murat Kantarcioglu, Danfeng Yao:
CHIRON: Deployment-quality Detection of Java Cryptographic Vulnerabilities. CoRR abs/1806.06881 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 22:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint