Xinyu Feng

ORCID: 0000-0003-1068-383X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Distributed systems and fault tolerance
  • Security and Verification in Computing
  • Logic, programming, and type systems
  • Parallel Computing and Optimization Techniques
  • Formal Methods in Verification
  • Mobile Agent-Based Network Management
  • Real-Time Systems Scheduling
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Complexity and Algorithms in Graphs
  • Advanced Data Storage Technologies
  • Mobile Ad Hoc Networks
  • Advanced Algorithms and Applications
  • Embedded Systems Design Techniques
  • Advanced Software Engineering Methodologies
  • Sentiment Analysis and Opinion Mining
  • Advanced Text Analysis Techniques
  • Cloud Data Security Solutions
  • Cognitive Functions and Memory
  • Advanced Malware Detection Techniques
  • Opportunistic and Delay-Tolerant Networks
  • Cryptography and Residue Arithmetic
  • Advanced Sensor and Control Systems
  • Viral Infections and Vectors
  • Optimization and Search Problems

Software (Spain)
2024

Peking University
2016-2024

Zhejiang Gongshang University Hangzhou College of Commerce
2024

Beijing University of Posts and Telecommunications
2016-2024

Southwest University
2024

Rice Research Institute
2024

Tea Research Institute
2024

Zhejiang University
2024

Guilin University of Electronic Technology
2024

Zhejiang Gongshang University
2024

Rely-Guarantee reasoning is a well-known method for verification of shared-variable concurrent programs. However, it difficult users to define rely/guarantee conditions, which specify threads' behaviors over the whole program state. Recent efforts combine Separation Logic with have made possible hide thread-local resources, but shared resources still need be globally known and specified. This greatly limits reuse verified modules.

10.1145/1480881.1480922 article EN 2009-01-20

Locating linearization points (LPs) is an intuitive approach for proving linearizability, but it difficult to apply the idea in Hoare-style logic formal program verification, especially verifying algorithms whose LPs cannot be statically located code. In this paper, we propose a with lightweight instrumentation mechanism which can verify non-fixed LPs, including most challenging ones that use helping achieve lock-freedom (as HSY elimination-based stack), or have depending on unpredictable...

10.1145/2491956.2462189 article EN 2013-06-11

Abstract Multimodal Aspect-Based Sentiment Analysis (MABSA) is an essential task in sentiment analysis that has garnered considerable attention recent years. Typical approaches MABSA often utilize cross-modal Transformers to capture interactions between textual and visual modalities. However, bridging the semantic gap modalities spaces addressing interference from irrelevant objects at different scales remains challenging. To tackle these limitations, we present Multi-level Textual-Visual...

10.1007/s10462-023-10685-z article EN cc-by Artificial Intelligence Review 2024-03-01

Hardware interrupts are widely used in the world's critical software systems to support preemptive threads, device drivers, operating system kernels, and hypervisors. Handling properly is an essential component of low-level programming. Unfortunately, also extremely hard reason about: they dramatically alter program control flow complicate invariants concurrent code (e.g., implementation synchronization primitives). Existing formal verification techniques---including Hoare logic, typed...

10.1145/1375581.1375603 article EN 2008-06-07

Existing work on verifying concurrent objects is mostly concerned with safety only, e.g., partial correctness or linearizability. Although there has been recent lock-freedom of non-blocking objects, much less efforts are focused deadlock-freedom and starvation-freedom, progress properties blocking objects. These more challenging to verify than because they allow the one thread depend another, assuming fair scheduling. We propose LiLi, a new rely-guarantee style program logic for...

10.1145/2837614.2837635 article EN 2016-01-07

In various situations, mobile agents at different hosts must cooperate with one another by sharing information and making decisions collectively. To ensure effective interagent communication, communication protocols track target agent locations deliver messages reliably. Researchers have proposed a wide range of schemes for tracking reliable message delivery. However, each scheme has its own assumptions, design goals, methodology. As result, no uniform or structured methods exist...

10.1109/mc.2002.1033028 article EN Computer 2002-09-01

Verifying program transformations usually requires proving that the resulting (the target) refines or is equivalent to original one source). However, refinement relation between individual sequential threads cannot be preserved in general with presence of parallel compositions, due instruction reordering and different granularities atomic operations at source target. On other hand, defined based on fully abstract semantics concurrent programs assumes arbitrary environments, which too strong...

10.1145/2103621.2103711 article EN ACM SIGPLAN Notices 2012-01-18

Although current large-scale generative language models (LMs) can show impressive insights about factual knowledge, they do not exhibit similar success with respect to human values judgements (e.g., whether or the generations of an LM are moral). Existing methods learn either by directly mimicking behavior data, rigidly constraining generation space human-chosen tokens. These inherently limited in that consider contextual and abstract nature as a result often fail when dealing out-of-domain...

10.18653/v1/2022.findings-naacl.18 article EN cc-by Findings of the Association for Computational Linguistics: NAACL 2022 2022-01-01

Runtime stacks are critical components of any modern software--they used to implement powerful control structures such as function call/return, stack cutting and unwinding, coroutines, thread context switch. Stack operations, however, very hard reason about: there no known formal specifications for certifying C-style setjmp/longjmp, or weak continuations (in C--). In many proof-carrying code (PCC) systems, return pointers exception handlers treated general first-class functions (as in...

10.1145/1133255.1134028 article EN ACM SIGPLAN Notices 2006-06-11

Today's software systems often use many different computation features and span abstraction levels (e.g., user code runtime-system code). To build foundational certified systems, it is hard to have a single verification system supporting all features. In this paper we present an open framework for proof-carrying (FPCC). It allows program modules be specified separately using type or logics. Certified (i.e., proof) can linked together fully systems. The supports modular proof reuse. also...

10.1145/1190315.1190325 article EN 2007-01-16

Verifying program transformations usually requires proving that the resulting (the target) refines or is equivalent to original one source). However, refinement relation between individual sequential threads cannot be preserved in general with presence of parallel compositions, due instruction reordering and different granularities atomic operations at source target. On other hand, defined based on fully abstract semantics concurrent programs assumes arbitrary environments, which too strong...

10.1145/2103656.2103711 article EN 2012-01-24

Runtime stacks are critical components of any modern software--they used to implement powerful control structures such as function call/return, stack cutting and unwinding, coroutines, thread context switch. Stack operations, however, very hard reason about: there no known formal specifications for certifying C-style setjmp/longjmp, or weak continuations (in C--). In many proof-carrying code (PCC) systems, return pointers exception handlers treated general first-class functions (as in...

10.1145/1133981.1134028 article EN 2006-06-11

Verifying program transformations usually requires proving that the resulting (the target) refines or is equivalent to original one source). However, refinement relation between individual sequential threads cannot be preserved in general with presence of parallel compositions, due instruction reordering and different granularities atomic operations at source target. On other hand, defined based on fully abstract semantics concurrent programs assumes arbitrary environments, which too strong...

10.1145/2576235 article EN ACM Transactions on Programming Languages and Systems 2014-03-01

Many verification problems can be reduced to refinement verification. However, existing work on verifying of concurrent programs either fails prove the preservation termination, allowing a diverging program trivially refine any programs, or is difficult apply in compositional thread-local reasoning. In this paper, we first propose new simulation technique, which establishes termination-preserving and congruence with respect parallel composition. We then give proof theory for simulation,...

10.1145/2603088.2603123 article EN 2014-07-14

SUMMARY Grain weight, grain number per panicle, and the of panicles are three factors that determine rice ( Oryza sativa L.) yield. Of these, which not only directly determines yield but also influences appearance quality, is often considered most important for production. Here, we describe OsNF‐YC1, a member NF‐Y transcription factor family regulates size. OsNF‐YC1 knockout plants osnf‐yc1 ), obtained using CRISPR‐Cas9 technology, showed reduced weight due to width thickness, with no change...

10.1111/tpj.16868 article EN The Plant Journal 2024-06-18

10.1109/tifs.2025.3552196 article EN IEEE Transactions on Information Forensics and Security 2025-01-01
Coming Soon ...