Academic Qualification
Ph.D., National University of Singapore, 2005
B.Sc., Beijing Institute of Technology, 1995
Teaching Area
Undergraduate Courses:
CS230 Computer Organization
CS231 Computer Organization Laboratory
SE370/EIE470 Computer Networks
SE371 Computer Networks Laboratory
PhD Courses:
DIAE01 Deep Learning
DINE02 Network Routing Protocol and Its Theory
Research Area
Explainable Artificial Intelligence (XAI)
- Project 1: Hierarchical Saliency Maps
- Project 2: Benchmarking Image Datasets and Models for Model Innovation
Edge Intelligence andArtificial Intelligece of Things (AIoT)
- Project 1: Light-weight Deep Models for Efficient Inference
- Project 2: TinyML Models Deployed on Strawberry PI and Arduino Boards
Hardware Accelerators for Data-Level Parallelism
- Project 1: GPT-DLP (General-Purpose and Transparent Accelerator for Data-Level Parallelism)
- Project 2: SSA-HPM (Software Semantics-Aware Hardware Performance Monitoring)
Energy Optimization for Mobile Systems
- Project 1: Efficient UI Rendering for OpenHarmony OS (industry sponsored)
- Project 2: Continuous Performance Evolution for SmartPhone OS and Apps (industry sponsored)
- Project 3: Temporal and Spatial Supersampling for Mobile Gaming (industry sponsored)
AI-enabled Flying Adhoc Networks
- Project 1: UAV Swarm for Multiple Target Searching and Tracking
Working Experience
2019 - present: Associate Professor, School of Computer Science and Engneering, Macau University of Science and Technology
2009 - 2019: Associate Professor, School of Electric and Computer Engineering, Peking University Shenzhen Graduate School
2008 - 2009: Lecturer, , Microprocessor Research and Development Center, Peking University Shenzhen Graduate School
2006 - 2008: Postdoctoral Researcher, School of EECS, Peking University
Academic Publication
[1] H. Sun, X. Li, Y. Yan, T. Jiang, and B. Liu, “A Supervised and Transfer Learning Based Two-Stage Framework for UAV Swarm Multi-Target Tracking,” IEEE Internet of Things Journal, pp. 1–1, 2026, doi: 10.1109/JIOT.2026.3651138.
[2] Y. Yan and X. Li, “S2R2Net: A network architecture for efficient inference with sample-specific redundancy reduction,” Pattern Recognition, vol. 168, p. 111831, Dec. 2025, doi: 10.1016/j.patcog.2025.111831.
[3] X. Li, H. Yu, X. Yang, H. Sun, and Y. Huang, “Efficient memory management with co-timeout policy eviction and history-enlightened selective strategy installation,” Future Generation Computer Systems, vol. 169, p. 107799, Aug. 2025, doi: 10.1016/j.future.2025.107799.
[4] Y. Yan, X. Li, K. Cui, H. Sun, and Z. Yu, “FreeNet: An efficient frequency-domain early exiting network for dynamic inference,” Knowledge-Based Systems, vol. 314, p. 113155, Apr. 2025, doi: 10.1016/j.knosys.2025.113155.
[5] X. Li and H. Sun, “Prediction-based reactive-greedy routing protocol for flying ad hoc networks,” Wireless Netw, Feb. 2025, doi: 10.1007/s11276-025-03925-3.
[6] Z. Yu, X. Li, and L. Sun, “A transformer cascaded model for defect detection of sewer pipes based on confusion matrix,” Meas. Sci. Technol., vol. 35, no. 11, p. 115410, Aug. 2024, doi: 10.1088/1361-6501/ad6f35.
[7] X. Li, H. Sun, and Y. Huang, “Efficient Flow Table Caching Architecture and Replacement Policy for SDN Switches,” J Netw Syst Manage, vol. 32, no. 3, p. 60, Jun. 2024, doi: 10.1007/s10922-024-09824-w.
[8] Y. Yan, T. Jiang, X. Li, L. Sun, J. Zhu, and J. Lin, “Model-agnostic progressive saliency map generation for object detector,” Image and Vision Computing, vol. 145, p. 104988, May 2024, doi: 10.1016/j.imavis.2024.104988.
[9] Y. Xin et al., “Recursive Multi-Tree Construction With Efficient Rule Sifting for Packet Classification on FPGA,” IEEE/ACM Transactions on Networking, vol. 32, no. 2, pp. 1707–1722, Apr. 2024, doi: 10.1109/TNET.2023.3330381.
[10] Z. Yu, X. Li, L. Sun, J. Zhu, and J. Lin, “A Composite Transformer-Based Multi-Stage Defect Detection Architecture for Sewer Pipes,” CMC, vol. 78, no. 1, pp. 435–451, 2024, doi: 10.32604/cmc.2023.046685.
[11] X. Li, J. Ma, Z. Yu, L. Sun, J. Zhu, and J. Lin, “D-Triple: An Optimized Defect Detection Deep Model for Sewer Pipes,” in 2023 IEEE International Conference on Smart Internet of Things (SmartIoT), Aug. 2023, pp. 88–95. doi: 10.1109/SmartIoT58732.2023.00020.
[12] L. Sun et al., “Deep learning-assisted automated sewage pipe defect detection for urban water environment management,” Science of The Total Environment, vol. 882, p. 163562, Jul. 2023, doi: 10.1016/j.scitotenv.2023.163562.
[13] X. Li and G. Li, “HB-ReTriple: Mobile rendering optimization based on efficient history reusing,” Journal of Systems Architecture, vol. 129, p. 102627, Aug. 2022, doi: 10.1016/j.sysarc.2022.102627.
[14] Y. Yan, X. Li, Y. Zhan, L. Sun, and J. Zhu, “GSM-HM: Generation of Saliency Maps for Black-Box Object Detection Model Based on Hierarchical Masking,” IEEE Access, vol. 10, pp. 98268–98277, 2022, doi: 10.1109/ACCESS.2022.3206379.
[15] F. Deng and X. Li, “LPAR: Link Stability Prediction-based Adaptive Routing Protocol for Flying Ad Hoc Networks,” in 2021 3rd International Conference on Information Technology and Computer Communications, in ITCC 2021. New York, NY, USA: Association for Computing Machinery, Oct. 2021, pp. 89–95. doi: 10.1145/3473465.3473481.
[16] Y. Li, X. Li, M. Chen, W. Zhou, and F. Deng, “SALAD: Static Analyzer for Loop Acceleration by Exploiting DLP,” in 2021 5th International Conference on High Performance Compilation, Computing and Communications, in HP3C’21. New York, NY, USA: Association for Computing Machinery, Jun. 2021, pp. 25–31. doi: 10.1145/3471274.3471279.
[17] W. Zhou, X. Li, M. Chen, and Y. Li, “Data-Level Parallelism Oriented Memory Access and On-Chip Buffering Mechanisms for a Loop Accelerator,” vol. 1914, p. 012047, May 2021, doi: 10.1088/1742-6596/1914/1/012047.
[18] C. Liu and X. Li, “LooPIM: A Loop-Oriented Acceleration Framework for Processing-in-Memory,” Journal of Physics: Conference Series, vol. 1914, p. 012023, May 2021, doi: 10.1088/1742-6596/1914/1/012023.
[19] M. Chen, X. Li, W. Zhou, Y. Li, and F. Deng, “LoopPara: an Architecture- Transparent Acceleration Framework for Loops by Exploiting Data-Level Parallelism,” in 2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS), Apr. 2021, pp. 22–27. doi: 10.1109/ICCCS52626.2021.9449282.
[20] X. Li and J. Zhao, “GNP: A Global-Sensitive Mechanism for Near-Data Processing,” presented at the IEEE International Conference on Power, Intelligent Computing and Systems (ICPICS), Jul. 2020.
[21] X. Li, G. Li, and X. Cui, “ReTriple: Reduction of Redundant Rendering on Android Devices for Performance and Energy Optimizations,” in 2020 57th ACM/IEEE Design Automation Conference (DAC), Jul. 2020, pp. 1–6. doi: 10.1109/DAC18072.2020.9218517.
[22] W. Li et al., “Tuple Space Assisted Packet Classification With High Performance on Both Search and Update,” IEEE Journal on Selected Areas in Communications, vol. 38, no. 7, pp. 1555–1569, Jul. 2020, doi: 10.1109/JSAC.2020.2986935.
[23] X. Li, C. Xu, and Q. Zhao, “Shellproof: More Efficient Zero-Knowledge Proofs for Confidential Transactions in Blockchain,” in 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), May 2020, pp. 1–5. doi: 10.1109/ICBC48266.2020.9169437.
[24] X. Li and G. Li, “An Adaptive CPU-GPU Governing Framework for Mobile Games on big.LITTLE Architectures,” IEEE Transactions on Computers, pp. 1–1, 2020, doi: 10.1109/TC.2020.3012987.
[25] M. Guo, M. Chen, C. Ma, Y. Li, X. Li, and X. Xie, “High-Level Task-Driven Single Image Deraining: Segmentation in Rainy Days,” in Neural Information Processing, H. Yang, K. Pasupa, A. C.-S. Leung, J. T. Kwok, J. H. Chan, and I. King, Eds., in Lecture Notes in Computer Science. Cham: Springer International Publishing, 2020, pp. 350–362. doi: 10.1007/978-3-030-63830-6_30.
[26] W. Li et al., “A power-saving pre-classifier for TCAM-based IP lookup,” Computer Networks, vol. 164, p. 106898, Dec. 2019, doi: 10.1016/j.comnet.2019.106898.
[27] X. Li and Y. Wang, “A Versatile Acceleration Framework for Machine Learning Algorithms,” in 2019 IEEE Intl Conf on Parallel Distributed Processing with Applications, Big Data Cloud Computing, Sustainable Computing Communications, Social Computing Networking (ISPA/BDCloud/SocialCom/SustainCom), Dec. 2019, pp. 493–500. doi: 10.1109/ISPA-BDCloud-SustainCom-SocialCom48970.2019.00076.
[28] X. Li and Y. Huang, “A Flow Table with Two-Stage Timeout Mechanism for SDN Switches,” in 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Aug. 2019, pp. 1804–1809. doi: 10.1109/HPCC/SmartCity/DSS.2019.00248.
[29] X. Li, J. Chen, F. Deng, and H. Li, “Profit-Driven Adaptive Moving Targets Search with UAV Swarms,” Sensors, vol. 19, no. 7, p. 1545, Jan. 2019, doi: 10.3390/s19071545.
[30] X. Li, J. Chen, and J. Li, “FATES: A Framework with Adaptive Track-Explore Strategy for Moving Targets Search by a FANET,” in 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom), Melbourne, Australia: IEEE, Dec. 2018, pp. 856–861. doi: 10.1109/BDCloud.2018.00127.
[31] X. Li, J. Li, and J. Chen, “Effective Cooperative UAV Searching Using Adaptive STGM Mobility Model in a FANET,” in 2018 IEEE Intl Conf on Parallel Distributed Processing with Applications, Ubiquitous Computing Communications, Big Data Cloud Computing, Social Computing Networking, Sustainable Computing Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom), Dec. 2018, pp. 295–301. doi: 10.1109/BDCloud.2018.00054.
[32] X. Li and Y. Shao, “Memory compression for Recursive Flow Classification Algorithm in Network Packet Processing Devices,” in 2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Oct. 2018, pp. 1502–1505. doi: 10.1109/IAEAC.2018.8577888.
[33] W. Li, X. Li, H. Li, and G. Xie, “CutSplit: A Decision-Tree Combining Cutting and Splitting for Scalable Packet Classification,” in IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, Apr. 2018, pp. 2645–2653. doi: 10.1109/INFOCOM.2018.8485947.
[34] X. Li and T. Zhang, “STGM: A Spatiotemporally Correlated Group Mobility Model for Flying Ad Hoc Networks,” in Communications and Networking, Q. Chen, W. Meng, and L. Zhao, Eds., in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2018, pp. 391–400.
[35] X. Li and J. Huang, “ABPP: An Adaptive Beacon Scheme for Geographic Routing in FANET,” in 2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), Dec. 2017, pp. 293–299. doi: 10.1109/PDCAT.2017.00055.
[36] X. Li and J. Chen, “An Efficient Framework for Target Search with Cooperative UAVs in a FANET,” in 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), Dec. 2017, pp. 306–313. doi: 10.1109/ISPA/IUCC.2017.00051.
[37] X. Li, T. Zhang, and J. Li, “A Particle Swarm Mobility Model for Flying Ad Hoc Networks,” in GLOBECOM 2017 - 2017 IEEE Global Communications Conference, Dec. 2017, pp. 1–6. doi: 10.1109/GLOCOM.2017.8253966.
[38] X. Li and J. Yan, “LEPR: Link Stability Estimation-based Preemptive Routing protocol for Flying Ad Hoc Networks,” in 2017 IEEE Symposium on Computers and Communications (ISCC), Jul. 2017, pp. 1079–1084. doi: 10.1109/ISCC.2017.8024669.
[39] X. Li and W. Xie, “CRAFT: A Cache Reduction Architecture for Flow Tables in Software-Defined Networks,” in 2017 IEEE Symposium on Computers and Communications (ISCC), Jul. 2017, pp. 967–972. doi: 10.1109/ISCC.2017.8024651.
[40] W. Li, X. Li, and H. Li, “MEET-IP: Memory and Energy Efficient TCAM-Based IP Lookup,” in 2017 26th International Conference on Computer Communication and Networks (ICCCN), Jul. 2017, pp. 1–8. doi: 10.1109/ICCCN.2017.8038369.
[41] X. Li, Guikang Chen, and Wen Wen, “Energy-efficient execution for repetitive app usages on big.LITTLE architectures,” in 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC), Jun. 2017, pp. 1–6. doi: 10.1145/3061639.3062239.
[42] X. Li and Z. Bao, “A comprehensive performance study of HTML5-enabled WebApps,” International Journal of Embedded Systems, vol. 9, no. 2, pp. 119–129, Jan. 2017, doi: 10.1504/IJES.2017.083732.
[43] X. Li and Y. Lin, “TaPaC: A TCAM-Assisted Algorithmic Packet Classification with Bounded Worst-Case Performance,” in 2016 IEEE Global Communications Conference (GLOBECOM), Dec. 2016, pp. 1–6. doi: 10.1109/GLOCOM.2016.7842313.
[44] X. Li, Y. Lin, and W. Li, “GreenTCAM: A memory- and energy-efficient TCAM-based packet classification,” in 2016 International Conference on Computing, Networking and Communications (ICNC), Feb. 2016, pp. 1–6. doi: 10.1109/ICCNC.2016.7440722.
[45] X. Li, W. Wen, and X. Wang, “Usage History-Directed Power Management for Smartphones,” in Algorithms and Architectures for Parallel Processing: 15th International Conference, ICA3PP 2015, Zhangjiajie, China, November 18-20, 2015, Proceedings, Part I, G. Wang, A. Zomaya, G. Martinez Perez, and K. Li, Eds., Cham: Springer International Publishing, 2015, pp. 288–302. [Online]. Available: http://dx.doi.org/10.1007/978-3-319-27119-4_20
[46] X. Li and B. Jin, “Performance Evaluation and Optimization of Wi-Fi Display on Android,” in Algorithms and Architectures for Parallel Processing: 15th International Conference, ICA3PP 2015, Zhangjiajie, China, November 18-20, 2015, Proceedings, Part IV, G. Wang, A. Zomaya, G. Martinez Perez, and K. Li, Eds., Cham: Springer International Publishing, 2015, pp. 204–215. [Online]. Available: http://dx.doi.org/10.1007/978-3-319-27140-8_15
[47] T. Zhang, X. Li, and R.-Z. Guo, “Producing virtual face images for single sample face recognition,” Optik - International Journal for Light and Electron Optics, vol. 125, no. 17, pp. 5017–5024, Sep. 2014, doi: 10.1016/j.ijleo.2014.01.171.
[48] X. Wang, X. Li, and W. Wen, “WLCleaner: Reducing Energy Waste Caused by WakeLock Bugs at Runtime,” in 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing (DASC), Aug. 2014, pp. 429–434. doi: 10.1109/DASC.2014.83.
[49] X. Li and Z. Bao, “Performance Characterization of Web Applications with HTML5 Enhancements,” in 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing, Aug. 2014, pp. 252–258. doi: 10.1109/DASC.2014.52.
[50] R. Shen, X. Li, and H. Li, “A space- and power-efficient multi-match packet classification technique combining TCAMs and SRAMs,” J Supercomput, vol. 69, no. 2, pp. 673–692, Jan. 2014, doi: 10.1007/s11227-014-1109-x.
[51] T. Zhang and X. Li, “Evaluating and Analyzing the Performance of RPL in Contiki,” in Proceedings of the First International Workshop on Mobile Sensing, Computing and Communication, in MSCC ’14. New York, NY, USA: ACM, 2014, pp. 19–24. doi: 10.1145/2633675.2633678.
[52] Z. Ruan, X. Li, and W. Li, “An energy-efficient TCAM-based packet classification with decision-tree mapping,” in TENCON 2013 - 2013 IEEE Region 10 Conference (31194), Oct. 2013, pp. 1–5. doi: 10.1109/TENCON.2013.6718883.
[53] W. Li and X. Li, “Scalable packet classification using hybrid and dynamic cuttings,” in TENCON 2013 - 2013 IEEE Region 10 Conference (31194), Oct. 2013, pp. 1–5. doi: 10.1109/TENCON.2013.6718858.
[54] W. Li and X. Li, “HybridCuts: A Scheme Combining Decomposition and Cutting for Packet Classification,” in 2013 IEEE 21st Annual Symposium on High-Performance Interconnects (HOTI), Aug. 2013, pp. 41–48. doi: 10.1109/HOTI.2013.12.
[55] R. Shen, X. Li, and H. Li, “A Hybrid TCAM + SRAM Scheme for Multi-match Packet Classification,” in 2012 13th International Conference on Parallel and Distributed Computing, Applications and Technologies, Dec. 2012, pp. 685–690. doi: 10.1109/PDCAT.2012.19.
[56] C. Jie, T. Dong, L. Xianfeng, X. Jinsong, and C. Xu, “A Slice Analysis-Based Bayesian Inference Dynamic Power Model for CMOS Combinational Circuits,” J. Semicond., vol. 29, no. 3, pp. 502–509, Feb. 2008.
[57] X. Li, Y. Liang, T. Mitra, and A. Roychoudhury, “Chronos: A timing analyzer for embedded software,” Science of Computer Programming, vol. 69, no. 1, pp. 56–67, Dec. 2007, doi: 10.1016/j.scico.2007.01.014.
[58] Y.-L. Zhao, X.-F. Li, D. Tong, and X. Cheng, “An Energy-Efficient Instruction Scheduler Design with Two-Level Shelving and Adaptive Banking,” J Comput Sci Technol, vol. 22, no. 1, pp. 15–24, Jan. 2007, doi: 10.1007/s11390-007-9001-2.
[59] X. Li, A. Roychoudhury, T. Mitra, P. Mishra, and X. Cheng, “A Retargetable Software Timing Analyzer Using Architecture Description Language,” in 2007 Asia and South Pacific Design Automation Conference, Jan. 2007, pp. 396–401. doi: 10.1109/ASPDAC.2007.358018.
[60] Y. Zhao, X. Li, D. Tong, and X. Cheng, “Reuse Distance Based Cache Leakage Control,” in High Performance Computing – HiPC 2007, S. Aluru, M. Parashar, R. Badrinath, and V. K. Prasanna, Eds., in Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2007, pp. 356–367.
[61] X. Li, A. Roychoudhury, and T. Mitra, “Modeling out-of-order processors for WCET analysis,” Real-Time Syst, vol. 34, no. 3, pp. 195–227, Nov. 2006, doi: 10.1007/s11241-006-9205-5.
[62] R. Jayaseelan, T. Mitra, and X. Li, “Estimating the Worst-Case Energy Consumption of Embedded Software,” in Proceedings of the 12th IEEE Real-Time and Embedded Technology and Applications Symposium, in RTAS ’06. USA: IEEE Computer Society, Apr. 2006, pp. 81–90. doi: 10.1109/RTAS.2006.17.
[63] X. Li, T. Mitra, and A. Roychoudhury, “Modeling Control Speculation for Timing Analysis,” Real-Time Systems, vol. 29, no. 1, pp. 27–58, Jan. 2005, doi: 10.1023/B:TIME.0000048933.15922.f9.
[64] X. Li, A. Roychoudhury, and T. Mitra, “Modeling Out-of-Order Processors for Software Timing Analysis,” in Proceedings of the 25th IEEE International Real-Time Systems Symposium, in RTSS ’04. Washington, DC, USA: IEEE Computer Society, 2004, pp. 92–103. doi: 10.1109/REAL.2004.33.
[65] X. Li, H. S. Negi, T. Mitra, and A. Roychoudhury, “Design Space Exploration of Caches Using Compressed Traces,” in Proceedings of the 18th Annual International Conference on Supercomputing, in ICS ’04. New York, NY, USA: ACM, 2004, pp. 116–125. doi: 10.1145/1006209.1006227.
[66] X. Li, T. Mitra, and A. Roychoudhury, “Accurate Timing Analysis by Modeling Caches, Speculation and Their Interaction,” in Proceedings of the 40th Annual Design Automation Conference, in DAC ’03. New York, NY, USA: ACM, 2003, pp. 466–471. doi: 10.1145/775832.775953.
[67] T. Mitra, A. Roychoudhury, and Xianfeng Li, “Timing analysis of embedded software for speculative processors,” in 15th International Symposium on System Synthesis, 2002., Oct. 2002, pp. 126–131. doi: 10.1145/581199.581229.
Honor
- Honorary Certificate from Huawei for Technology Transfer from Sponsored Research Project, 2025
