Search

Your search keyword '"Du, Xiaoning"' showing total 37 results

Search Constraints

Start Over You searched for: Author "Du, Xiaoning" Remove constraint Author: "Du, Xiaoning" Search Limiters Full Text Remove constraint Search Limiters: Full Text
37 results on '"Du, Xiaoning"'

Search Results

1. Automated Trustworthiness Oracle Generation for Machine Learning Text Classifiers

2. FDI: Attack Neural Code Generation Systems through User Feedback Channel

Catalog

Books, media, physical & digital resources

3. LLM as Runtime Error Handler: A Promising Pathway to Adaptive Self-Healing of Software Systems

4. Detect Llama -- Finding Vulnerabilities in Smart Contracts using Large Language Models

5. BigCodeBench: Benchmarking Code Generation with Diverse Function Calls and Complex Instructions

6. AI Coders Are Among Us: Rethinking Programming Language Grammar Towards Efficient Code Generation

7. ContrastRepair: Enhancing Conversation-Based Automated Program Repair via Contrastive Test Case Pairs

8. SongBsAb: A Dual Prevention Approach against Singing Voice Conversion based Illegal Song Covers

9. Are Latent Vulnerabilities Hidden Gems for Software Vulnerability Prediction? An Empirical Study

10. Pop Quiz! Do Pre-trained Code Models Possess Knowledge of Correct API Names?

11. CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models

13. Source Code Data Augmentation for Deep Learning: A Survey

15. Don't Complete It! Preventing Unhelpful Code Completion for Productive and Sustainable Neural Code Completion Systems

16. On the Importance of Building High-quality Training Datasets for Neural Code Search

17. CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning

18. Towards Characterizing Adversarial Defects of Deep Learning Software from the Lens of Uncertainty

19. Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems

20. Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks

21. LEOPARD: Identifying Vulnerable Code for Vulnerability Assessment through Program Metrics

22. DeepCruiser: Automated Guided Testing for Stateful Deep Learning Systems

24. Synthesis of Isotope Labeled Protocatechuic Acid-(13COOH)

25. Determination of Isotopic Abundance of 15N-Labeled Amino Acids in Tea

26. Syntheses of Stable Isotope [13C]/D Labelled p-Methoxybenzoic Acid

27. A Proactive and Dual Prevention Mechanism against Illegal Song Covers empowered by Singing Voice Conversion

28. When Neural Code Completion Models Size up the Situation: Attaining Cheaper and Faster Completion through Dynamic Model Inference

30. The evolution of crystal‐poor rhyolite in the middle Okinawa Trough and its implications for the state of magma chamber.

31. Data Augmentation Approaches for Source Code Models: A Survey

32. The Hidden Price of Hotel FeaturesForming Room Rate: Focused on Star-type Segmented Market in China

37. Evidence-based practice implementation in healthcare in China: a living scoping review