Skip to main content

Showing 1–12 of 12 results for author: She, X

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.11346  [pdf, other

    cs.SE

    WaDec: Decompile WebAssembly Using Large Language Model

    Authors: Xinyu She, Yanjie Zhao, Haoyu Wang

    Abstract: WebAssembly (abbreviated Wasm) has emerged as a cornerstone of web development, offering a compact binary format that allows high-performance applications to run at near-native speeds in web browsers. Despite its advantages, Wasm's binary nature presents significant challenges for developers and researchers, particularly regarding readability when debugging or analyzing web applications. Therefore… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

  2. arXiv:2312.10456  [pdf, other

    cs.SE

    WRTester: Differential Testing of WebAssembly Runtimes via Semantic-aware Binary Generation

    Authors: Shangtong Cao, Ningyu He, Xinyu She, Yixuan Zhang, Mu Zhang, Haoyu Wang

    Abstract: Wasm runtime is a fundamental component in the Wasm ecosystem, as it directly impacts whether Wasm applications can be executed as expected. Bugs in Wasm runtime bugs are frequently reported, thus our research community has made a few attempts to design automated testing frameworks for detecting bugs in Wasm runtimes. However, existing testing frameworks are limited by the quality of test cases, i… ▽ More

    Submitted 16 December, 2023; originally announced December 2023.

  3. arXiv:2310.17903  [pdf, other

    cs.SE cs.AI

    Pitfalls in Language Models for Code Intelligence: A Taxonomy and Survey

    Authors: Xinyu She, Yue Liu, Yanjie Zhao, Yiling He, Li Li, Chakkrit Tantithamthavorn, Zhan Qin, Haoyu Wang

    Abstract: Modern language models (LMs) have been successfully employed in source code generation and understanding, leading to a significant increase in research focused on learning-based code intelligence, such as automated bug repair, and test case generation. Despite their great potential, language models for code intelligence (LM4Code) are susceptible to potential pitfalls, which hinder realistic perfor… ▽ More

    Submitted 27 October, 2023; originally announced October 2023.

  4. arXiv:2310.14200  [pdf, ps, other

    cs.IT

    Dynamic Resource Management in CDRT Systems through Adaptive NOMA

    Authors: Hongjiang Lei, Mingxu Yang, Ki-Hong Park, Nasir Saeed, Xusheng She, Jianling Cao

    Abstract: This paper introduces a novel adaptive transmission scheme to amplify the prowess of coordinated direct and relay transmission (CDRT) systems rooted in non-orthogonal multiple access principles. Leveraging the maximum ratio transmission scheme, we seamlessly meet the prerequisites of CDRT while harnessing the potential of dynamic power allocation and directional antennas to elevate the system's op… ▽ More

    Submitted 22 October, 2023; originally announced October 2023.

    Comments: 11 pages, 7 figures, submitted to IEEE journal for review

  5. arXiv:2208.05736  [pdf, other

    cs.LG cs.AI

    Learning Point Processes using Recurrent Graph Network

    Authors: Saurabh Dash, Xueyuan She, Saibal Mukhopadhyay

    Abstract: We present a novel Recurrent Graph Network (RGN) approach for predicting discrete marked event sequences by learning the underlying complex stochastic process. Using the framework of Point Processes, we interpret a marked discrete event sequence as the superposition of different sequences each of a unique type. The nodes of the Graph Network use LSTM to incorporate past information whereas a Graph… ▽ More

    Submitted 11 August, 2022; originally announced August 2022.

    Comments: Accepted at IJCNN 2022

  6. arXiv:2205.12591  [pdf, ps, other

    cs.IT

    On Secure NOMA-CDRT Systems with Physical Layer Network Coding

    Authors: Hongjiang Lei, Xusheng She, Ki-Hong Park, Imran Shafique Ansari, Zheng Shi, **g Jiang, Mohamed-Slim Alouini

    Abstract: This paper proposes a new scheme to enhance the secrecy performance of a NOMA-based coordinated direct relay transmission system (NOMA-CDRT) with an untrusted relay. The physical-layer network coding and the non-orthogonal multiple access scheme are combined to improve the spectrum efficiency. Furthermore, inter-user interference and friendly jamming signals are utilized to suppress the eavesdropp… ▽ More

    Submitted 25 May, 2022; originally announced May 2022.

    Comments: submitted to IEEE Journal for review

  7. arXiv:2104.10719  [pdf, other

    cs.CV cs.AI eess.IV

    A Fully Spiking Hybrid Neural Network for Energy-Efficient Object Detection

    Authors: Biswadeep Chakraborty, Xueyuan She, Saibal Mukhopadhyay

    Abstract: This paper proposes a Fully Spiking Hybrid Neural Network (FSHNN) for energy-efficient and robust object detection in resource-constrained platforms. The network architecture is based on Convolutional SNN using leaky-integrate-fire neuron models. The model combines unsupervised Spike Time-Dependent Plasticity (STDP) learning with back-propagation (STBP) learning methods and also uses Monte Carlo D… ▽ More

    Submitted 23 July, 2021; v1 submitted 21 April, 2021; originally announced April 2021.

    Comments: 10 pages, Submitted Manuscript

  8. Reversible data hiding in encrypted images based on pixel prediction and multi-MSB planes rearrangement

    Authors: Zhaoxia Yin, Xiaomeng She, ** Tang, Bin Luo

    Abstract: Great concern has arisen in the field of reversible data hiding in encrypted images (RDHEI) due to the development of cloud storage and privacy protection. RDHEI is an effective technology that can embed additional data after image encryption, extract additional data error-free and reconstruct original images losslessly. In this paper, a high-capacity and fully reversible RDHEI method is proposed,… ▽ More

    Submitted 20 March, 2021; v1 submitted 8 July, 2020; originally announced July 2020.

    Journal ref: Signal Processing, 2021, 187: 1-11

  9. arXiv:1909.05401  [pdf, other

    cs.NE cs.ET

    Improving Robustness of ReRAM-based Spiking Neural Network Accelerator with Stochastic Spike-timing-dependent-plasticity

    Authors: Xueyuan She, Yun Long, Saibal Mukhopadhyay

    Abstract: Spike-timing-dependent-plasticity (STDP) is an unsupervised learning algorithm for spiking neural network (SNN), which promises to achieve deeper understanding of human brain and more powerful artificial intelligence. While conventional computing system fails to simulate SNN efficiently, process-in-memory (PIM) based on devices such as ReRAM can be used in designing fast and efficient STDP based S… ▽ More

    Submitted 11 September, 2019; originally announced September 2019.

  10. arXiv:1909.05314  [pdf, other

    cs.LG cs.IR stat.ML

    ScieNet: Deep Learning with Spike-assisted Contextual Information Extraction

    Authors: Xueyuan She, Yun Long, Daehyun Kim, Saibal Mukhopadhyay

    Abstract: Deep neural networks (DNNs) provide high image classification accuracy, but experience significant performance degradation when perturbation from various sources are present in the input. The lack of resilience to input perturbations makes DNN less reliable for systems interacting with physical world such as autonomous vehicles, robotics, to name a few, where imperfect input is the normal conditio… ▽ More

    Submitted 11 September, 2019; originally announced September 2019.

  11. arXiv:1806.07439  [pdf, other

    cs.AI

    HybridNet: Integrating Model-based and Data-driven Learning to Predict Evolution of Dynamical Systems

    Authors: Yun Long, Xueyuan She, Saibal Mukhopadhyay

    Abstract: The robotic systems continuously interact with complex dynamical systems in the physical world. Reliable predictions of spatiotemporal evolution of these dynamical systems, with limited knowledge of system dynamics, are crucial for autonomous operation. In this paper, we present HybridNet, a framework that integrates data-driven deep learning and model-driven computation to reliably predict spatio… ▽ More

    Submitted 5 January, 2019; v1 submitted 19 June, 2018; originally announced June 2018.

  12. Overload Control for Scaling WeChat Microservices

    Authors: Hao Zhou, Ming Chen, Qian Lin, Yong Wang, Xiaobin She, Sifan Liu, Rui Gu, Beng Chin Ooi, Junfeng Yang

    Abstract: Effective overload control for large-scale online service system is crucial for protecting the system backend from overload. Conventionally, the design of overload control is ad-hoc for individual service. However, service-specific overload control could be detrimental to the overall system due to intricate service dependencies or flawed implementation of service. Service developers usually have d… ▽ More

    Submitted 23 December, 2018; v1 submitted 11 June, 2018; originally announced June 2018.

    Comments: This version has updated the adaptive admission control algorithm by merging the errata published in v2

    Journal ref: ACM SoCC (2018) 149-161