Search

Your search keyword '"Du, Xiaoning"' showing total 108 results

Search Constraints

Start Over You searched for: Author "Du, Xiaoning" Remove constraint Author: "Du, Xiaoning"
108 results on '"Du, Xiaoning"'

Search Results

1. Automated Trustworthiness Oracle Generation for Machine Learning Text Classifiers

2. FDI: Attack Neural Code Generation Systems through User Feedback Channel

3. LLM as Runtime Error Handler: A Promising Pathway to Adaptive Self-Healing of Software Systems

4. Detect Llama -- Finding Vulnerabilities in Smart Contracts using Large Language Models

5. BigCodeBench: Benchmarking Code Generation with Diverse Function Calls and Complex Instructions

6. AI Coders Are Among Us: Rethinking Programming Language Grammar Towards Efficient Code Generation

7. ContrastRepair: Enhancing Conversation-Based Automated Program Repair via Contrastive Test Case Pairs

8. SongBsAb: A Dual Prevention Approach against Singing Voice Conversion based Illegal Song Covers

9. Are Latent Vulnerabilities Hidden Gems for Software Vulnerability Prediction? An Empirical Study

11. Pop Quiz! Do Pre-trained Code Models Possess Knowledge of Correct API Names?

12. CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models

13. Source Code Data Augmentation for Deep Learning: A Survey

14. Don't Complete It! Preventing Unhelpful Code Completion for Productive and Sustainable Neural Code Completion Systems

16. On the Importance of Building High-quality Training Datasets for Neural Code Search

17. CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning

18. Towards Characterizing Adversarial Defects of Deep Learning Software from the Lens of Uncertainty

19. Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems

20. Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks

21. LEOPARD: Identifying Vulnerable Code for Vulnerability Assessment through Program Metrics

22. DeepCruiser: Automated Guided Testing for Stateful Deep Learning Systems

23. Don't Complete It! Preventing Unhelpful Code Completion for Productive and Sustainable Neural Code Completion Systems.

26. Synthesis of Isotope Labeled Protocatechuic Acid-(13COOH)

27. Determination of Isotopic Abundance of 15N-Labeled Amino Acids in Tea

28. Syntheses of Stable Isotope [13C]/D Labelled p-Methoxybenzoic Acid

29. A Proactive and Dual Prevention Mechanism against Illegal Song Covers empowered by Singing Voice Conversion

30. When Neural Code Completion Models Size up the Situation: Attaining Cheaper and Faster Completion through Dynamic Model Inference

32. The evolution of crystal‐poor rhyolite in the middle Okinawa Trough and its implications for the state of magma chamber.

34. Towards Building a Generic Vulnerability Detection Platform by Combining Scalable Attacking Surface Analysis and Directed Fuzzing

36. Data Augmentation Approaches for Source Code Models: A Survey

37. Trace-Length Independent Runtime Monitoring of Quantitative Policies in LTL

43. The Hidden Price of Hotel FeaturesForming Room Rate: Focused on Star-type Segmented Market in China

49. Marble

Catalog

Books, media, physical & digital resources