


default search action
Feng Xu 0007
Person information
- affiliation: Nanjing University, State Key Laboratory for Novel Software Technology, China
Other persons with the same name
- Feng Xu — disambiguation page
- Feng Xu 0001
— Fudan University, Key Laboratory for Information Science of Electromagnetic Waves (MoE), Shanghai, China
- Feng Xu 0002
— Kennedy Krieger Institute, Baltimore, MD, USA (and 2 more)
- Feng Xu 0003
— Xi'an Jiaotong University, China (and 2 more)
- Feng Xu 0004
— Shenzhen Institute of Information Technology, School of Software Engineering, China
- Feng Xu 0005
— Tsinghua University, BNRIst, Beijing, China (and 2 more)
- Feng Xu 0006
— Tsinghua University, Graduate School at Shenzhen, Center of Intelligent Control and Telescience, China (and 1 more)
- Feng Xu 0008
— Hohai University, College of Computer and Information, Nanjing, China
- Feng Xu 0009
— Nanjing University of Posts and Telecommunications, College of Electronic and Optical Engineering, China
- Feng Xu 0010
— University of Michigan-Dearborn, College of Business, MI, USA (and 1 more)
- Feng Xu 0011
— Hunan University, School of Mathematics, Changsha, China
- Feng Xu 0012
— Aalto University, Department of Information and Communications Engineering, Espoo, Finland (and 2 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c47]Tong Wang, Yuan Yao, Feng Xu, Miao Xu
, Shengwei An, Ting Wang:
Inspecting Prediction Confidence for Detecting Black-Box Backdoor Attacks. AAAI 2024: 274-282 - [c46]Ruifeng Chen, Xu-Hui Liu, Tian-Shuo Liu, Shengyi Jiang, Feng Xu, Yang Yu:
Foresight Distribution Adjustment for Off-policy Reinforcement Learning. AAMAS 2024: 317-325 - [c45]Senrong Xu
, Jiamei Shen
, Yunfan Li
, Yuan Yao
, Ping Yu
, Feng Xu
, Xiaoxing Ma
:
On the Heterophily of Program Graphs: A Case Study of Graph-based Type Inference. Internetware 2024 - [i8]Feng Xu, Yan Yin, Xinyu Zhang, Tianyuan Liu, Shengyi Jiang, Zongzhang Zhang:
Alpha2: Discovering Logical Formulaic Alphas using Deep Reinforcement Learning. CoRR abs/2406.16505 (2024) - 2023
- [j19]Senrong Xu
, Liangyue Li
, Zenan Li
, Yuan Yao
, Feng Xu
, Zulong Chen
, Quan Lu
, Hanghang Tong
:
On the Vulnerability of Graph Learning-based Collaborative Filtering. ACM Trans. Inf. Syst. 41(4): 87:1-87:28 (2023) - [c44]Xu-Hui Liu, Feng Xu, Xinyu Zhang, Tianyuan Liu, Shengyi Jiang, Ruifeng Chen, Zongzhang Zhang, Yang Yu:
How To Guide Your Learner: Imitation Learning with Active Adaptive Expert Involvement. AAMAS 2023: 1276-1284 - [c43]Shengbin Xu, Yuan Yao, Feng Xu, Tianxiao Gu, Jingwei Xu, Xiaoxing Ma:
Data Quality Matters: A Case Study of Obsolete Comment Detection. ICSE 2023: 781-793 - [c42]Bingzhe Zhou
, Xinying Wang
, Shengbin Xu
, Yuan Yao
, Minxue Pan
, Feng Xu
, Xiaoxing Ma
:
Hybrid API Migration: A Marriage of Small API Mapping Models and Large Language Models. Internetware 2023: 12-21 - [i7]Xu-Hui Liu, Feng Xu, Xinyu Zhang, Tianyuan Liu, Shengyi Jiang, Ruifeng Chen, Zongzhang Zhang, Yang Yu:
How To Guide Your Learner: Imitation Learning with Active Adaptive Expert Involvement. CoRR abs/2303.02073 (2023) - 2022
- [j18]Yaojing Wang
, Yuan Yao
, Hanghang Tong, Feng Xu, Jian Lu:
Auditing Network Embedding: An Edge Influence Based Approach. IEEE Trans. Knowl. Data Eng. 34(11): 5211-5224 (2022) - [c41]Tong Wang, Yuan Yao, Feng Xu, Shengwei An, Hanghang Tong, Ting Wang:
An Invisible Black-Box Backdoor Attack Through Frequency Domain. ECCV (13) 2022: 396-413 - [c40]Siyu Chen, Shengbin Xu, Yuan Yao, Feng Xu:
Untangling Composite Commits by Attributed Graph Clustering. Internetware 2022: 117-126 - [c39]Shengbin Xu, Yuan Yao, Feng Xu, Tianxiao Gu, Hanghang Tong:
Combining Code Context and Fine-grained Code Difference for Commit Message Generation. Internetware 2022: 242-251 - [c38]Ji Liu, Zenan Li, Yuan Yao, Feng Xu, Xiaoxing Ma, Miao Xu
, Hanghang Tong:
Fair Representation Learning: An Alternative to Mutual Information. KDD 2022: 1088-1097 - [c37]Yaojing Wang, Yuan Yao, Feng Xu, Yada Zhu, Hanghang Tong:
Structure Meets Sequences: Predicting Network of Co-evolving Sequences. WSDM 2022: 1090-1098 - [i6]Senrong Xu, Yuan Yao, Liangyue Li, Wei Yang, Feng Xu, Hanghang Tong:
Detecting Topology Attacks against Graph Neural Networks. CoRR abs/2204.10072 (2022) - [i5]Tong Wang, Yuan Yao, Feng Xu, Miao Xu, Shengwei An, Ting Wang:
Confidence Matters: Inspecting Backdoors in Deep Neural Networks via Distribution Transfer. CoRR abs/2208.06592 (2022) - 2021
- [c36]Feng Xu, Shengyi Jiang, Hao Yin, Zongzhang Zhang, Yang Yu, Ming Li, Dong Li, Wulong Liu:
Enhancing Context-Based Meta-Reinforcement Learning Algorithms via An Efficient Task Encoder (Student Abstract). AAAI 2021: 15937-15938 - [c35]Xiong-Hui Chen, Shengyi Jiang, Feng Xu, Zongzhang Zhang, Yang Yu:
Cross-modal Domain Adaptation for Cost-Efficient Visual Reinforcement Learning. NeurIPS 2021: 12520-12532 - [c34]Xu-Hui Liu, Zhenghai Xue, Jing-Cheng Pang, Shengyi Jiang, Feng Xu, Yang Yu:
Regret Minimization Experience Replay in Off-Policy Reinforcement Learning. NeurIPS 2021: 17604-17615 - [c33]Guosheng Pan, Yuan Yao, Hanghang Tong, Feng Xu, Jian Lu:
Unsupervised Attributed Network Embedding via Cross Fusion. WSDM 2021: 797-805 - [i4]Zhenghai Xue, Xu-Hui Liu, Jing-Cheng Pang, Shengyi Jiang, Feng Xu, Yang Yu:
Regret Minimization Experience Replay. CoRR abs/2105.07253 (2021) - [i3]Tong Wang, Yuan Yao, Feng Xu, Shengwei An, Hanghang Tong, Ting Wang:
Backdoor Attack through Frequency Domain. CoRR abs/2111.10991 (2021) - 2020
- [j17]Yaojing Wang, Yuan Yao, Hanghang Tong
, Xuan Huo, Ming Li, Feng Xu, Jian Lu:
Enhancing supervised bug localization with metadata and stack-trace. Knowl. Inf. Syst. 62(6): 2461-2484 (2020) - [c32]Yaojing Wang, Guosheng Pan, Yuan Yao, Hanghang Tong
, Hongxia Yang, Feng Xu, Jian Lu:
Bringing Order to Network Embedding: A Relative Ranking based Approach. CIKM 2020: 1585-1594 - [c31]Long Chen, Yuan Yao, Feng Xu, Miao Xu, Hanghang Tong:
Trading Personalization for Accuracy: Data Debugging in Collaborative Filtering. NeurIPS 2020
2010 – 2019
- 2019
- [j16]Yaojing Wang, Yuan Yao, Hanghang Tong
, Feng Xu, Jian Lu:
A Brief Review of Network Embedding. Big Data Min. Anal. 2(1): 35-47 (2019) - [j15]Shengqu Xi, Yuan Yao, Xusheng Xiao
, Feng Xu, Jian Lu:
Bug Triaging Based on Tossing Sequence Modeling. J. Comput. Sci. Technol. 34(5): 942-956 (2019) - [j14]Yuan Yao
, Hanghang Tong
, Guo Yan, Feng Xu, Xiang Zhang, Boleslaw K. Szymanski
, Jian Lu:
Dual-regularized one-class collaborative filtering with implicit feedback. World Wide Web 22(3): 1099-1129 (2019) - [c30]Shijie Tang, Yuan Yao, Suwei Zhang, Feng Xu, Tianxiao Gu, Hanghang Tong, Xiaohui Yan, Jian Lu:
An Integral Tag Recommendation Model for Textual Content. AAAI 2019: 5109-5116 - [c29]Suwei Zhang, Yuan Yao, Feng Xu, Hanghang Tong, Xiaohui Yan, Jian Lu:
Hashtag Recommendation for Photo Sharing Services. AAAI 2019: 5805-5812 - [c28]Shengqu Xi, Shao Yang, Xusheng Xiao
, Yuan Yao, Yayuan Xiong, Fengyuan Xu, Haoyu Wang, Peng Gao, Zhuotao Liu, Feng Xu, Jian Lu:
DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps. CCS 2019: 2421-2436 - [c27]Yaojing Wang, Yuan Yao, Hanghang Tong
, Feng Xu, Jian Lu:
Discerning Edge Influence for Network Embedding. CIKM 2019: 429-438 - [c26]Shengbin Xu
, Yuan Yao, Feng Xu, Tianxiao Gu, Hanghang Tong
, Jian Lu:
Commit Message Generation for Source Code Changes. IJCAI 2019: 3975-3981 - [c25]Rongxun Guo, Tianxiao Gu, Yuan Yao, Feng Xu, Xiaoxing Ma:
Speedup Automatic Program Repair Using Dynamic Software Updating: An Empirical Study. Internetware 2019: 14:1-14:10 - 2018
- [j13]Yong Wu, Shengqu Xi, Yuan Yao, Feng Xu, Hanghang Tong
, Jian Lu:
Guiding supervised topic modeling for content based tag recommendation. Neurocomputing 314: 479-489 (2018) - [c24]Yaojing Wang, Yuan Yao, Hanghang Tong
, Xuan Huo, Min Li, Feng Xu, Jian Lu:
Bug Localization via Supervised Topic Modeling. ICDM 2018: 607-616 - [c23]Shengqu Xi, Yuan Yao, Xusheng Xiao
, Feng Xu, Jian Lu:
An Effective Approach for Routing the Bug Reports to the Right Fixers. Internetware 2018: 11:1-11:10 - [c22]Lun Zhao, Yuan Yao, Guibing Guo, Hanghang Tong
, Feng Xu, Jian Lu:
Team Expansion in Collaborative Environments. PAKDD (3) 2018: 713-725 - [r2]Yuan Yao, Hanghang Tong, Feng Xu, Jian Lu:
Subgraph Extraction for Trust Inference in Social Networks. Encyclopedia of Social Network Analysis and Mining. 2nd Ed. 2018 - 2017
- [j12]Yuan Yao, Hanghang Tong, Feng Xu, Jian Lu:
On the Measurement and Prediction of Web Content Utility: A Review. SIGKDD Explor. 19(2): 1-12 (2017) - [j11]Yuan Yao, Hanghang Tong
, Feng Xu, Jian Lu:
Scalable Algorithms for CQA Post Voting Prediction. IEEE Trans. Knowl. Data Eng. 29(8): 1723-1736 (2017) - [j10]Yuan Yao, Wayne Xin Zhao, Yaojing Wang, Hanghang Tong
, Feng Xu, Jian Lu:
Version-Aware Rating Prediction for Mobile App Recommendation. ACM Trans. Inf. Syst. 35(4): 38:1-38:33 (2017) - [c21]Xiaofei Zhang, Yuan Yao, Yaojing Wang, Feng Xu, Jian Lu:
Exploring Metadata in Bug Reports for Bug Localization. APSEC 2017: 328-337 - 2016
- [c20]Yong Wu, Yuan Yao, Feng Xu, Hanghang Tong
, Jian Lu:
Tag2Word: Using Tags to Generate Words for Content Based Tag Recommendation. CIKM 2016: 2287-2292 - 2015
- [j9]Yuan Yao, Hanghang Tong
, Tao Xie, Leman Akoglu, Feng Xu, Jian Lu:
Detecting high-quality posts in community question answering sites. Inf. Sci. 302: 70-82 (2015) - [c19]Licheng Li, Yuan Yao, Feng Xu, Jian Lu:
MATAR: Keywords Enhanced Multi-label Learning for Tag Recommendation. APWeb 2015: 268-279 - [c18]Bin Chen, Ping Yu
, Chun Cao, Feng Xu, Jian Lu:
ConRec: A Software Framework for Context-Aware Recommendation Based on Dynamic and Personalized Context. COMPSAC 2015: 816-821 - [c17]Yaojing Wang, Feng Xu, Yuan Yao, Yong Wu:
Detecting Buggy Files based on Bug Reports: A Random Walk Based Approach. Internetware 2015: 62-69 - [c16]Guo Yan, Yuan Yao, Feng Xu, Jian Lu:
RIT: Enhancing Recommendation with Inferred Trust. PAKDD (2) 2015: 756-767 - 2014
- [j8]Jiufeng Zhou, Lixin Han, Yuan Yao, Xiaoqin Zeng, Feng Xu:
A Parallel Approach to Link Sign Prediction in Large-Scale Online Social Networks. Comput. J. 57(7): 1092-1104 (2014) - [j7]Yuan Yao, Hanghang Tong
, Xifeng Yan, Feng Xu, Jian Lu:
Multi-Aspect + Transitivity + Bias: An Integral Trust Inference Model. IEEE Trans. Knowl. Data Eng. 26(7): 1706-1719 (2014) - [c15]Yuan Yao, Hanghang Tong
, Tao Xie, Leman Akoglu, Feng Xu, Jian Lu:
Joint voting prediction for questions and answers in CQA. ASONAM 2014: 340-343 - [c14]Yuan Yao, Hanghang Tong
, Guo Yan, Feng Xu, Xiang Zhang, Boleslaw K. Szymanski
, Jian Lu:
Dual-Regularized One-Class Collaborative Filtering. CIKM 2014: 759-768 - [c13]Yuan Yao, Hanghang Tong
, Feng Xu, Jian Lu:
Predicting long-term impact of CQA posts: a comprehensive viewpoint. KDD 2014: 1496-1505 - [c12]Xiaoyu Chen, Yuan Yao, Feng Xu, Jian Lu:
Exploring Review Content for Recommendation via Latent Factor Model. PRICAI 2014: 668-679 - [r1]Yuan Yao, Hanghang Tong, Feng Xu, Jian Lu:
Subgraph Extraction for Trust Inference in Social Networks. Encyclopedia of Social Network Analysis and Mining 2014: 2084-2098 - 2013
- [j6]Yuan Yao, Feng Xu, Yongli Ren
, Hanghang Tong
, Jian Lü:
SelfTrust: leveraging self-assessment for trust inference in Internetware. Sci. China Inf. Sci. 56(10): 1-14 (2013) - [j5]Yuan Yao, Hanghang Tong
, Feng Xu, Jian Lu:
Pairwise trust inference by subgraph extraction. Soc. Netw. Anal. Min. 3(4): 953-968 (2013) - [c11]Guo Yan, Feng Xu, Yuan Yao, Jian Lu:
Enhancing trustworthiness evaluation in internetware with similarity and non-negative constraints. Internetware 2013: 25:1-25:4 - [c10]Yuan Yao, Hanghang Tong, Xifeng Yan, Feng Xu, Jian Lu:
MATRI: a multi-aspect and transitive trust inference model. WWW 2013: 1467-1476 - [i2]Yuan Yao, Hanghang Tong, Tao Xie, Leman Akoglu, Feng Xu, Jian Lu:
Want a Good Answer? Ask a Good Question First! CoRR abs/1311.6876 (2013) - 2012
- [j4]Yuan Yao, Sini Ruohomaa, Feng Xu:
Addressing Common Vulnerabilities of Reputation Systems for Electronic Commerce. J. Theor. Appl. Electron. Commer. Res. 7(1): 1-20 (2012) - [c9]Yuan Yao, Hanghang Tong
, Feng Xu, Jian Lu:
Subgraph Extraction for Trust Inference in Social Networks. ASONAM 2012: 163-170 - [c8]Tao Liu, Feng Xu, Yuan Yao, Jian Lu:
A group recommendation approach for service selection. Internetware 2012: 10:1-10:5 - [i1]Yuan Yao, Hanghang Tong, Xifeng Yan, Feng Xu, Jian Lu:
MaTrust: An Effective Multi-Aspect Trust Inference Model. CoRR abs/1211.2041 (2012) - 2011
- [c7]Yuan Yao, Jiufeng Zhou, Lixin Han, Feng Xu, Jian Lü:
Comparing Linkage Graph and Activity Graph of Online Social Networks. SocInfo 2011: 84-97 - 2010
- [j3]Tianwei Sun, Feng Xu, Jian Lü:
An Internetware Based Approach to Building Web Page Integration Applications for Mobile Devices. Int. J. Softw. Informatics 4(3): 367-382 (2010) - [c6]Tianwei Sun, Feng Xu, Jian Lü:
An internetware based approach to building web page integration applications for mobile devices. Internetware 2010: 5
2000 – 2009
- 2009
- [j2]Feng Xu, Jing Pan, Wen Lu:
A Trust-Based Approach to Estimating the Confidence of the Software System in Open Environments. J. Comput. Sci. Technol. 24(2): 373-385 (2009) - [c5]Jian Lü, Xiaoxing Ma
, Yu Huang, Chun Cao, Feng Xu:
Internetware: a shift of software paradigm. Internetware 2009: 7 - [c4]Jing Pan, Feng Xu, Yuan Yao, Jian Lü:
A dynamic trust network based simulation framework for reputation-based service selection. Internetware 2009: 14 - [c3]Bo Zong, Feng Xu, Jun Jiao, Jian Lv:
A Broker-Assisting Trust and Reputation System Based on Artificial Neural Network. SMC 2009: 4710-4715 - 2007
- [c2]Yuan Wang, Ye Tao, Ping Yu
, Feng Xu, Jian Lü:
A Trust Evolution Model for P2P Networks. ATC 2007: 216-225 - 2006
- [j1]Yuan Wang, Feng Xu, Jian Lü:
Establishing recommendation trust relationships for internetwares. ACM SIGSOFT Softw. Eng. Notes 31(1): 1-5 (2006) - [c1]Yuan Wang, Feng Xu, Ye Tao, Chun Cao, Jian Lü:
Toward Trust Management in Autonomic and Coordination Applications. ATC 2006: 236-245
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-08 01:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint