


Остановите войну!
for scientists:


default search action
Feng Xu 0007
Person information

- affiliation: Nanjing University, State Key Laboratory for Novel Software Technology, China
Other persons with the same name
- Feng Xu — disambiguation page
- Feng Xu 0001
— Fudan University, Key Laboratory for Information Science of Electromagnetic Waves (MoE), Shanghai, China
- Feng Xu 0002
— Kennedy Krieger Institute, Baltimore, MD, USA (and 2 more)
- Feng Xu 0003
— Xi'an Jiaotong University, China (and 2 more)
- Feng Xu 0004
— Shenzhen Institute of Information Technology, School of Software Engineering, China
- Feng Xu 0005
— Microsoft Research, Beijing, China (and 1 more)
- Feng Xu 0006
— Tsinghua University, Graduate School at Shenzhen, Center of Intelligent Control and Telescience, China (and 1 more)
- Feng Xu 0008
— Hohai University, College of Computer and Information, Nanjing, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j18]Yaojing Wang
, Yuan Yao
, Hanghang Tong, Feng Xu, Jian Lu:
Auditing Network Embedding: An Edge Influence Based Approach. IEEE Trans. Knowl. Data Eng. 34(11): 5211-5224 (2022) - [c38]Tong Wang, Yuan Yao, Feng Xu, Shengwei An, Hanghang Tong, Ting Wang:
An Invisible Black-Box Backdoor Attack Through Frequency Domain. ECCV (13) 2022: 396-413 - [c37]Siyu Chen, Shengbin Xu, Yuan Yao, Feng Xu:
Untangling Composite Commits by Attributed Graph Clustering. Internetware 2022: 117-126 - [c36]Shengbin Xu, Yuan Yao, Feng Xu, Tianxiao Gu, Hanghang Tong:
Combining Code Context and Fine-grained Code Difference for Commit Message Generation. Internetware 2022: 242-251 - [c35]Ji Liu, Zenan Li, Yuan Yao, Feng Xu, Xiaoxing Ma, Miao Xu, Hanghang Tong:
Fair Representation Learning: An Alternative to Mutual Information. KDD 2022: 1088-1097 - [c34]Yaojing Wang, Yuan Yao, Feng Xu, Yada Zhu, Hanghang Tong:
Structure Meets Sequences: Predicting Network of Co-evolving Sequences. WSDM 2022: 1090-1098 - [i5]Senrong Xu, Yuan Yao, Liangyue Li, Wei Yang, Feng Xu, Hanghang Tong:
Detecting Topology Attacks against Graph Neural Networks. CoRR abs/2204.10072 (2022) - [i4]Tong Wang, Yuan Yao, Feng Xu, Miao Xu, Shengwei An, Ting Wang:
Confidence Matters: Inspecting Backdoors in Deep Neural Networks via Distribution Transfer. CoRR abs/2208.06592 (2022) - 2021
- [c33]Guosheng Pan, Yuan Yao, Hanghang Tong, Feng Xu, Jian Lu:
Unsupervised Attributed Network Embedding via Cross Fusion. WSDM 2021: 797-805 - [i3]Tong Wang, Yuan Yao, Feng Xu, Shengwei An, Hanghang Tong, Ting Wang:
Backdoor Attack through Frequency Domain. CoRR abs/2111.10991 (2021) - 2020
- [j17]Yaojing Wang, Yuan Yao, Hanghang Tong
, Xuan Huo, Ming Li, Feng Xu, Jian Lu:
Enhancing supervised bug localization with metadata and stack-trace. Knowl. Inf. Syst. 62(6): 2461-2484 (2020) - [c32]Yaojing Wang, Guosheng Pan, Yuan Yao, Hanghang Tong
, Hongxia Yang, Feng Xu, Jian Lu:
Bringing Order to Network Embedding: A Relative Ranking based Approach. CIKM 2020: 1585-1594 - [c31]Long Chen, Yuan Yao, Feng Xu, Miao Xu, Hanghang Tong:
Trading Personalization for Accuracy: Data Debugging in Collaborative Filtering. NeurIPS 2020
2010 – 2019
- 2019
- [j16]Yaojing Wang, Yuan Yao, Hanghang Tong
, Feng Xu, Jian Lu:
A Brief Review of Network Embedding. Big Data Min. Anal. 2(1): 35-47 (2019) - [j15]Shengqu Xi, Yuan Yao, Xusheng Xiao
, Feng Xu, Jian Lu:
Bug Triaging Based on Tossing Sequence Modeling. J. Comput. Sci. Technol. 34(5): 942-956 (2019) - [j14]Yuan Yao
, Hanghang Tong
, Guo Yan, Feng Xu, Xiang Zhang, Boleslaw K. Szymanski
, Jian Lu:
Dual-regularized one-class collaborative filtering with implicit feedback. World Wide Web 22(3): 1099-1129 (2019) - [c30]Shijie Tang, Yuan Yao, Suwei Zhang, Feng Xu, Tianxiao Gu, Hanghang Tong, Xiaohui Yan, Jian Lu:
An Integral Tag Recommendation Model for Textual Content. AAAI 2019: 5109-5116 - [c29]Suwei Zhang, Yuan Yao, Feng Xu, Hanghang Tong, Xiaohui Yan, Jian Lu:
Hashtag Recommendation for Photo Sharing Services. AAAI 2019: 5805-5812 - [c28]Shengqu Xi, Shao Yang, Xusheng Xiao
, Yuan Yao, Yayuan Xiong, Fengyuan Xu, Haoyu Wang, Peng Gao, Zhuotao Liu, Feng Xu, Jian Lu:
DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps. CCS 2019: 2421-2436 - [c27]Yaojing Wang, Yuan Yao, Hanghang Tong
, Feng Xu, Jian Lu:
Discerning Edge Influence for Network Embedding. CIKM 2019: 429-438 - [c26]Shengbin Xu
, Yuan Yao, Feng Xu, Tianxiao Gu, Hanghang Tong
, Jian Lu:
Commit Message Generation for Source Code Changes. IJCAI 2019: 3975-3981 - [c25]Rongxun Guo, Tianxiao Gu, Yuan Yao, Feng Xu, Xiaoxing Ma:
Speedup Automatic Program Repair Using Dynamic Software Updating: An Empirical Study. Internetware 2019: 14:1-14:10 - 2018
- [j13]Yong Wu, Shengqu Xi, Yuan Yao, Feng Xu, Hanghang Tong
, Jian Lu:
Guiding supervised topic modeling for content based tag recommendation. Neurocomputing 314: 479-489 (2018) - [c24]Yaojing Wang, Yuan Yao, Hanghang Tong
, Xuan Huo, Min Li, Feng Xu, Jian Lu:
Bug Localization via Supervised Topic Modeling. ICDM 2018: 607-616 - [c23]Shengqu Xi, Yuan Yao, Xusheng Xiao
, Feng Xu, Jian Lu:
An Effective Approach for Routing the Bug Reports to the Right Fixers. Internetware 2018: 11:1-11:10 - [c22]Lun Zhao, Yuan Yao, Guibing Guo, Hanghang Tong
, Feng Xu, Jian Lu:
Team Expansion in Collaborative Environments. PAKDD (3) 2018: 713-725 - [r2]Yuan Yao, Hanghang Tong, Feng Xu, Jian Lu:
Subgraph Extraction for Trust Inference in Social Networks. Encyclopedia of Social Network Analysis and Mining. 2nd Ed. 2018 - 2017
- [j12]Yuan Yao, Hanghang Tong, Feng Xu, Jian Lu:
On the Measurement and Prediction of Web Content Utility: A Review. SIGKDD Explor. 19(2): 1-12 (2017) - [j11]Yuan Yao, Hanghang Tong
, Feng Xu, Jian Lu:
Scalable Algorithms for CQA Post Voting Prediction. IEEE Trans. Knowl. Data Eng. 29(8): 1723-1736 (2017) - [j10]Yuan Yao, Wayne Xin Zhao, Yaojing Wang, Hanghang Tong
, Feng Xu, Jian Lu:
Version-Aware Rating Prediction for Mobile App Recommendation. ACM Trans. Inf. Syst. 35(4): 38:1-38:33 (2017) - [c21]Xiaofei Zhang, Yuan Yao, Yaojing Wang, Feng Xu, Jian Lu:
Exploring Metadata in Bug Reports for Bug Localization. APSEC 2017: 328-337 - 2016
- [c20]Yong Wu, Yuan Yao, Feng Xu, Hanghang Tong
, Jian Lu:
Tag2Word: Using Tags to Generate Words for Content Based Tag Recommendation. CIKM 2016: 2287-2292 - 2015
- [j9]Yuan Yao, Hanghang Tong
, Tao Xie, Leman Akoglu, Feng Xu, Jian Lu:
Detecting high-quality posts in community question answering sites. Inf. Sci. 302: 70-82 (2015) - [c19]Licheng Li, Yuan Yao, Feng Xu, Jian Lu:
MATAR: Keywords Enhanced Multi-label Learning for Tag Recommendation. APWeb 2015: 268-279 - [c18]Bin Chen, Ping Yu, Chun Cao, Feng Xu, Jian Lu:
ConRec: A Software Framework for Context-Aware Recommendation Based on Dynamic and Personalized Context. COMPSAC 2015: 816-821 - [c17]Yaojing Wang, Feng Xu, Yuan Yao, Yong Wu:
Detecting Buggy Files based on Bug Reports: A Random Walk Based Approach. Internetware 2015: 62-69 - [c16]Guo Yan, Yuan Yao, Feng Xu, Jian Lu:
RIT: Enhancing Recommendation with Inferred Trust. PAKDD (2) 2015: 756-767 - 2014
- [j8]Jiufeng Zhou, Lixin Han, Yuan Yao, Xiaoqin Zeng, Feng Xu:
A Parallel Approach to Link Sign Prediction in Large-Scale Online Social Networks. Comput. J. 57(7): 1092-1104 (2014) - [j7]Yuan Yao, Hanghang Tong
, Xifeng Yan, Feng Xu, Jian Lu:
Multi-Aspect + Transitivity + Bias: An Integral Trust Inference Model. IEEE Trans. Knowl. Data Eng. 26(7): 1706-1719 (2014) - [c15]Yuan Yao, Hanghang Tong
, Tao Xie, Leman Akoglu, Feng Xu, Jian Lu:
Joint voting prediction for questions and answers in CQA. ASONAM 2014: 340-343 - [c14]Yuan Yao, Hanghang Tong
, Guo Yan, Feng Xu, Xiang Zhang, Boleslaw K. Szymanski
, Jian Lu:
Dual-Regularized One-Class Collaborative Filtering. CIKM 2014: 759-768 - [c13]Yuan Yao, Hanghang Tong
, Feng Xu, Jian Lu:
Predicting long-term impact of CQA posts: a comprehensive viewpoint. KDD 2014: 1496-1505 - [c12]Xiaoyu Chen, Yuan Yao, Feng Xu, Jian Lu:
Exploring Review Content for Recommendation via Latent Factor Model. PRICAI 2014: 668-679 - [r1]Yuan Yao, Hanghang Tong, Feng Xu, Jian Lu:
Subgraph Extraction for Trust Inference in Social Networks. Encyclopedia of Social Network Analysis and Mining 2014: 2084-2098 - 2013
- [j6]Yuan Yao, Feng Xu, Yongli Ren
, Hanghang Tong
, Jian Lü:
SelfTrust: leveraging self-assessment for trust inference in Internetware. Sci. China Inf. Sci. 56(10): 1-14 (2013) - [j5]Yuan Yao, Hanghang Tong
, Feng Xu, Jian Lu:
Pairwise trust inference by subgraph extraction. Soc. Netw. Anal. Min. 3(4): 953-968 (2013) - [c11]Guo Yan, Feng Xu, Yuan Yao, Jian Lu:
Enhancing trustworthiness evaluation in internetware with similarity and non-negative constraints. Internetware 2013: 25:1-25:4 - [c10]Yuan Yao, Hanghang Tong, Xifeng Yan, Feng Xu, Jian Lu:
MATRI: a multi-aspect and transitive trust inference model. WWW 2013: 1467-1476 - [i2]Yuan Yao, Hanghang Tong, Tao Xie, Leman Akoglu, Feng Xu, Jian Lu:
Want a Good Answer? Ask a Good Question First! CoRR abs/1311.6876 (2013) - 2012
- [j4]Yuan Yao, Sini Ruohomaa, Feng Xu:
Addressing Common Vulnerabilities of Reputation Systems for Electronic Commerce. J. Theor. Appl. Electron. Commer. Res. 7(1): 1-20 (2012) - [c9]Yuan Yao, Hanghang Tong
, Feng Xu, Jian Lu:
Subgraph Extraction for Trust Inference in Social Networks. ASONAM 2012: 163-170 - [c8]Tao Liu, Feng Xu, Yuan Yao, Jian Lu:
A group recommendation approach for service selection. Internetware 2012: 10:1-10:5 - [i1]Yuan Yao, Hanghang Tong, Xifeng Yan, Feng Xu, Jian Lu:
MaTrust: An Effective Multi-Aspect Trust Inference Model. CoRR abs/1211.2041 (2012) - 2011
- [c7]Yuan Yao, Jiufeng Zhou, Lixin Han, Feng Xu, Jian Lü:
Comparing Linkage Graph and Activity Graph of Online Social Networks. SocInfo 2011: 84-97 - 2010
- [j3]Tianwei Sun, Feng Xu, Jian Lü:
An Internetware Based Approach to Building Web Page Integration Applications for Mobile Devices. Int. J. Softw. Informatics 4(3): 367-382 (2010) - [c6]Tianwei Sun, Feng Xu, Jian Lü:
An internetware based approach to building web page integration applications for mobile devices. Internetware 2010: 5
2000 – 2009
- 2009
- [j2]Feng Xu, Jing Pan, Wen Lu:
A Trust-Based Approach to Estimating the Confidence of the Software System in Open Environments. J. Comput. Sci. Technol. 24(2): 373-385 (2009) - [c5]Jian Lü, Xiaoxing Ma
, Yu Huang, Chun Cao, Feng Xu:
Internetware: a shift of software paradigm. Internetware 2009: 7 - [c4]Jing Pan, Feng Xu, Yuan Yao, Jian Lü:
A dynamic trust network based simulation framework for reputation-based service selection. Internetware 2009: 14 - [c3]Bo Zong, Feng Xu, Jun Jiao, Jian Lv:
A Broker-Assisting Trust and Reputation System Based on Artificial Neural Network. SMC 2009: 4710-4715 - 2007
- [c2]Yuan Wang, Ye Tao, Ping Yu, Feng Xu, Jian Lü:
A Trust Evolution Model for P2P Networks. ATC 2007: 216-225 - 2006
- [j1]Yuan Wang, Feng Xu, Jian Lü:
Establishing recommendation trust relationships for internetwares. ACM SIGSOFT Softw. Eng. Notes 31(1): 1-5 (2006) - [c1]Yuan Wang, Feng Xu, Ye Tao, Chun Cao, Jian Lü:
Toward Trust Management in Autonomic and Coordination Applications. ATC 2006: 236-245
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-03-22 22:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint