Follow
Xiaoting Li
Xiaoting Li
Visa Research
Verified email at visa.com - Homepage
Title
Cited by
Cited by
Year
Deepfuzz: Automatic generation of syntax valid c programs for fuzz testing
X Liu, X Li, R Prajapati, D Wu
Proceedings of the AAAI Conference on Artificial Intelligence 33 (01), 1044-1051, 2019
1152019
Denoising self-attentive sequential recommendation
H Chen, Y Lin, M Pan, L Wang, CCM Yeh, X Li, Y Zheng, F Wang, H Yang
Proceedings of the 16th ACM Conference on Recommender Systems, 92-101, 2022
562022
Abacus: Precise side-channel analysis
Q Bao, Z Wang, X Li, JR Larus, D Wu
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021
292021
Turning attacks into protection: Social media privacy protection using adversarial attacks
X Li, L Chen, D Wu
Proceedings of the 2021 SIAM International Conference on Data Mining (SDM …, 2021
192021
Distilling Knowledge on Text Graph for Social Media Attribute Inference
Q Li, X Li, L Chen, D Wu
The 45th International ACM SIGIR Conference on Research and Development in …, 2022
182022
Tinykg: Memory-efficient training framework for knowledge graph neural recommender systems
H Chen, X Li, K Zhou, X Hu, CCM Yeh, Y Zheng, H Yang
Proceedings of the 16th ACM Conference on Recommender Systems, 257-267, 2022
162022
Enhancing robustness of graph convolutional networks via dropping graph connections
L Chen, X Li, D Wu
Machine Learning and Knowledge Discovery in Databases: European Conference …, 2021
142021
ALPHAPROG: reinforcement generation of valid programs for compiler fuzzing
X Li, X Liu, L Chen, R Prajapati, D Wu
Proceedings of the AAAI Conference on Artificial Intelligence 36 (11), 12559 …, 2022
92022
Adversarially reprogramming pretrained neural networks for data-limited and cost-efficient malware detection
L Chen, X Li, D Wu
Proceedings of the 2022 SIAM International Conference on Data Mining (SDM …, 2022
82022
Adversary for social good: Leveraging attribute-obfuscating attack to protect user privacy on social networks
X Li, L Chen, D Wu
International Conference on Security and Privacy in Communication Systems …, 2022
62022
SmartQuery: An Active Learning Framework for Graph Neural Networks through Hybrid Uncertainty Reduction
X Li, Y Wu, V Rakesh, Y Lin, H Yang, F Wang
Proceedings of the 31st ACM International Conference on Information …, 2022
62022
FuzzBoost: Reinforcement Compiler Fuzzing
X Li, X Liu, L Chen, R Prajapati, D Wu
International Conference on Information and Communications Security, 359-375, 2022
62022
Watermarking-based defense against adversarial attacks on deep neural networks
X Li, L Chen, J Zhang, J Larus, D Wu
2021 International Joint Conference on Neural Networks (IJCNN), 1-8, 2021
62021
Adversarial Collaborative Filtering for Free
H Chen, X Li, V Lai, CCM Yeh, Y Fan, Y Zheng, M Das, H Yang
Proceedings of the 17th ACM Conference on Recommender Systems, 245-255, 2023
52023
Probabilistic Masked Attention Networks for Explainable Sequential Recommendation.
H Chen, K Zhou, Z Jiang, CCM Yeh, X Li, M Pan, Y Zheng, X Hu, H Yang
IJCAI, 2068-2076, 2023
52023
Adversary for social good: Leveraging adversarial attacks to protect personal attribute privacy
X Li, L Chen, D Wu
ACM Transactions on Knowledge Discovery from Data 18 (2), 1-24, 2023
42023
Reinforcement compiler fuzzing
X Liu, R Prajapati, X Li, D Wu
32019
TabLog: Test-Time Adaptation for Tabular Data Using Logic Rules
W Ren, X Li, H Chen, V Rakesh, Z Wang, M Das, VG Honavar
Forty-first International Conference on Machine Learning, 0
1
Generating In-Distribution Proxy Graphs for Explaining Graph Neural Networks
Z Chen, J Zhang, J Ni, X Li, Y Bian, MM Islam, A Mondal, H Wei, D Luo
Forty-first International Conference on Machine Learning, 0
1
GAIM: Attacking Graph Neural Networks via Adversarial Influence Maximization
X Yang, X Li, H Chen, Y Cai
arXiv preprint arXiv:2408.10948, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20