default search action
Xin-Cheng Wen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Xin-Cheng Wen, Kunhong Liu, Yan Luo, Jiaxin Ye, Li-Yan Chen:
TWACapsNet: a capsule network with two-way attention mechanism for speech emotion recognition. Soft Comput. 28(15-16): 8701-8713 (2024) - [j3]Xin-Cheng Wen, Cuiyun Gao, Jiaxin Ye, Yichen Li, Zhihong Tian, Yan Jia, Xuan Wang:
Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection. IEEE Trans. Software Eng. 50(3): 360-375 (2024) - [j2]Xin-Cheng Wen, Cuiyun Gao, Feng Luo, Haoyu Wang, Ge Li, Qing Liao:
LIVABLE: Exploring Long-Tailed Classification of Software Vulnerability Types. IEEE Trans. Software Eng. 50(6): 1325-1339 (2024) - [c11]Bowen Zeng, Chaozheng Wang, Chunjiong Zhang, Elena Molino-Peña, Jindong Feng, Lei Gan, Shuzheng Gao, Tao Shi, Xin-Cheng Wen, Yishan Chen, Yuanchao Liu, Yujia Chen, Zhuofeng Zhao, Zhangbing Zhou, Yucong Duan, Shizhan Chen, Guobing Zou, Buqing Cao:
Reviewers. SSE 2024: xxi - [c10]Xinchen Wang, Ruida Hu, Cuiyun Gao, Xin-Cheng Wen, Yujia Chen, Qing Liao:
ReposVul: A Repository-Level High-Quality Vulnerability Dataset. ICSE Companion 2024: 472-483 - [c9]Xin-Cheng Wen, Cuiyun Gao, Shuzheng Gao, Yang Xiao, Michael R. Lyu:
SCALE: Constructing Structured Natural Language Comment Trees for Software Vulnerability Detection. ISSTA 2024: 235-247 - [c8]Xin-Cheng Wen:
Collaboration to Repository-Level Vulnerability Detection. ISSTA 2024: 1926-1928 - [i13]Xin-Cheng Wen, Cuiyun Gao, Xinchen Wang, Ruiqi Wang, Tao Zhang, Qing Liao:
Game Rewards Vulnerabilities: Software Vulnerability Detection with Zero-Sum Game and Prototype Learning. CoRR abs/2401.08131 (2024) - [i12]Xinchen Wang, Ruida Hu, Cuiyun Gao, Xin-Cheng Wen, Yujia Chen, Qing Liao:
A Repository-Level Dataset For Detecting, Classifying and Repairing Software Vulnerabilities. CoRR abs/2401.13169 (2024) - [i11]Xin-Cheng Wen, Cuiyun Gao, Shuzheng Gao, Yang Xiao, Michael R. Lyu:
SCALE: Constructing Structured Natural Language Comment Trees for Software Vulnerability Detection. CoRR abs/2403.19096 (2024) - [i10]Xin-Cheng Wen, Xinchen Wang, Yujia Chen, Ruida Hu, David Lo, Cuiyun Gao:
VulEval: Towards Repository-Level Evaluation of Software Vulnerability Detection. CoRR abs/2404.15596 (2024) - 2023
- [c7]Jiaxin Ye, Xin-Cheng Wen, Yujie Wei, Yong Xu, Kunhong Liu, Hongming Shan:
Temporal Modeling Matters: A Novel Temporal Emotional Modeling Approach for Speech Emotion Recognition. ICASSP 2023: 1-5 - [c6]Xin-Cheng Wen, Yupan Chen, Cuiyun Gao, Hongyu Zhang, Jie M. Zhang, Qing Liao:
Vulnerability Detection with Graph Simplification and Enhanced Graph Representation Learning. ICSE 2023: 2275-2286 - [c5]Xin-Cheng Wen, Xinchen Wang, Cuiyun Gao, Shaohua Wang, Yang Liu, Zhaoquan Gu:
When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection. ASE 2023: 345-357 - [c4]Shuzheng Gao, Xin-Cheng Wen, Cuiyun Gao, Wenxuan Wang, Hongyu Zhang, Michael R. Lyu:
What Makes Good In-Context Demonstrations for Code Intelligence Tasks with LLMs? ASE 2023: 761-773 - [c3]Jiaxin Ye, Yujie Wei, Xin-Cheng Wen, Chenglong Ma, Zhizhong Huang, Kunhong Liu, Hongming Shan:
Emo-DNA: Emotion Decoupling and Alignment Learning for Cross-Corpus Speech Emotion Recognition. ACM Multimedia 2023: 5956-5965 - [i9]Xin-Cheng Wen, Yupan Chen, Cuiyun Gao, Hongyu Zhang, Jie M. Zhang, Qing Liao:
Vulnerability Detection with Graph Simplification and Enhanced Graph Representation Learning. CoRR abs/2302.04675 (2023) - [i8]Shuzheng Gao, Xin-Cheng Wen, Cuiyun Gao, Wenxuan Wang, Michael R. Lyu:
Constructing Effective In-Context Demonstration for Code Intelligence Tasks: An Empirical Study. CoRR abs/2304.07575 (2023) - [i7]Xin-Cheng Wen, Cuiyun Gao, Feng Luo, Haoyu Wang, Ge Li, Qing Liao:
LIVABLE: Exploring Long-Tailed Classification of Software Vulnerability Types. CoRR abs/2306.06935 (2023) - [i6]Jiaxin Ye, Yujie Wei, Xin-Cheng Wen, Chenglong Ma, Zhizhong Huang, Kunhong Liu, Hongming Shan:
Emo-DNA: Emotion Decoupling and Alignment Learning for Cross-Corpus Speech Emotion Recognition. CoRR abs/2308.02190 (2023) - [i5]Xin-Cheng Wen, Xinchen Wang, Cuiyun Gao, Shaohua Wang, Yang Liu, Zhaoquan Gu:
When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection. CoRR abs/2308.10523 (2023) - 2022
- [j1]Jiaxin Ye, Xin-Cheng Wen, Xuan-Ze Wang, Yong Xu, Yan Luo, Chang-Li Wu, Li-Yan Chen, Kunhong Liu:
GM-TCNet: Gated Multi-scale Temporal Convolutional Network using Emotion Causality for Speech Emotion Recognition. Speech Commun. 145: 21-35 (2022) - [c2]Xin-Cheng Wen, Jiaxin Ye, Yan Luo, Yong Xu, Xuan-Ze Wang, Chang-Li Wu, Kun-Hong Liu:
CTL-MTNet: A Novel CapsNet and Transfer Learning-Based Mixed Task Net for Single-Corpus and Cross-Corpus Speech Emotion Recognition. IJCAI 2022: 2305-2311 - [i4]Xin-Cheng Wen, Jiaxin Ye, Yan Luo, Yong Xu, Xuan-Ze Wang, Chang-Li Wu, Kun-Hong Liu:
CTL-MTNet: A Novel CapsNet and Transfer Learning-Based Mixed Task Net for the Single-Corpus and Cross-Corpus Speech Emotion Recognition. CoRR abs/2207.10644 (2022) - [i3]Jiaxin Ye, Xin-Cheng Wen, Xuan-Ze Wang, Yong Xu, Yan Luo, Chang-Li Wu, Li-Yan Chen, Kun-Hong Liu:
GM-TCNet: Gated Multi-scale Temporal Convolutional Network using Emotion Causality for Speech Emotion Recognition. CoRR abs/2210.15834 (2022) - [i2]Jiaxin Ye, Xin-Cheng Wen, Yujie Wei, Yong Xu, Kunhong Liu, Hongming Shan:
Temporal Modeling Matters: A Novel Temporal Emotional Modeling Approach for Speech Emotion Recognition. CoRR abs/2211.08233 (2022) - [i1]Xin-Cheng Wen, Cuiyun Gao, Jiaxin Ye, Zhihong Tian, Yan Jia, Xuan Wang:
Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection. CoRR abs/2212.14274 (2022) - 2020
- [c1]Xin-Cheng Wen, Kun-Hong Liu, Wei-Ming Zhang, Kai Jiang:
The Application of Capsule Neural Network Based CNN for Speech Emotion Recognition. ICPR 2020: 9356-9362
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 00:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint