Alert button
Picture for Xiaoning Du

Xiaoning Du

Alert button

A Proactive and Dual Prevention Mechanism against Illegal Song Covers empowered by Singing Voice Conversion

Add code
Bookmark button
Alert button
Jan 30, 2024
Guangke Chen, Yedi Zhang, Fu Song, Ting Wang, Xiaoning Du, Yang Liu

Viaarxiv icon

Are Latent Vulnerabilities Hidden Gems for Software Vulnerability Prediction? An Empirical Study

Add code
Bookmark button
Alert button
Jan 20, 2024
Triet H. M. Le, Xiaoning Du, M. Ali Babar

Viaarxiv icon

When Neural Code Completion Models Size up the Situation: Attaining Cheaper and Faster Completion through Dynamic Model Inference

Add code
Bookmark button
Alert button
Jan 18, 2024
Zhensu Sun, Xiaoning Du, Fu Song, Shangwen Wang, Li Li

Viaarxiv icon

Pop Quiz! Do Pre-trained Code Models Possess Knowledge of Correct API Names?

Add code
Bookmark button
Alert button
Sep 14, 2023
Terry Yue Zhuo, Xiaoning Du, Zhenchang Xing, Jiamou Sun, Haowei Quan, Li Li, Liming Zhu

Figure 1 for Pop Quiz! Do Pre-trained Code Models Possess Knowledge of Correct API Names?
Figure 2 for Pop Quiz! Do Pre-trained Code Models Possess Knowledge of Correct API Names?
Figure 3 for Pop Quiz! Do Pre-trained Code Models Possess Knowledge of Correct API Names?
Figure 4 for Pop Quiz! Do Pre-trained Code Models Possess Knowledge of Correct API Names?
Viaarxiv icon

CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models

Add code
Bookmark button
Alert button
Aug 28, 2023
Zhensu Sun, Xiaoning Du, Fu Song, Li Li

Figure 1 for CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models
Figure 2 for CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models
Figure 3 for CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models
Figure 4 for CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models
Viaarxiv icon

Data Augmentation Approaches for Source Code Models: A Survey

Add code
Bookmark button
Alert button
Jun 12, 2023
Terry Yue Zhuo, Zhou Yang, Zhensu Sun, Yufei Wang, Li Li, Xiaoning Du, Zhenchang Xing, David Lo

Figure 1 for Data Augmentation Approaches for Source Code Models: A Survey
Figure 2 for Data Augmentation Approaches for Source Code Models: A Survey
Figure 3 for Data Augmentation Approaches for Source Code Models: A Survey
Figure 4 for Data Augmentation Approaches for Source Code Models: A Survey
Viaarxiv icon

Learning to Prevent Profitless Neural Code Completion

Add code
Bookmark button
Alert button
Sep 13, 2022
Zhensu Sun, Xiaoning Du, Fu Song, Shangwen Wang, Mingze Ni, Li Li

Figure 1 for Learning to Prevent Profitless Neural Code Completion
Figure 2 for Learning to Prevent Profitless Neural Code Completion
Figure 3 for Learning to Prevent Profitless Neural Code Completion
Figure 4 for Learning to Prevent Profitless Neural Code Completion
Viaarxiv icon

On the Importance of Building High-quality Training Datasets for Neural Code Search

Add code
Bookmark button
Alert button
Feb 14, 2022
Zhensu Sun, Li Li, Yan Liu, Xiaoning Du, Li Li

Figure 1 for On the Importance of Building High-quality Training Datasets for Neural Code Search
Figure 2 for On the Importance of Building High-quality Training Datasets for Neural Code Search
Figure 3 for On the Importance of Building High-quality Training Datasets for Neural Code Search
Figure 4 for On the Importance of Building High-quality Training Datasets for Neural Code Search
Viaarxiv icon

CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning

Add code
Bookmark button
Alert button
Oct 25, 2021
Zhensu Sun, Xiaoning Du, Fu Song, Mingze Ni, Li Li

Figure 1 for CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning
Figure 2 for CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning
Figure 3 for CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning
Figure 4 for CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning
Viaarxiv icon

Towards Characterizing Adversarial Defects of Deep Learning Software from the Lens of Uncertainty

Add code
Bookmark button
Alert button
Apr 24, 2020
Xiyue Zhang, Xiaofei Xie, Lei Ma, Xiaoning Du, Qiang Hu, Yang Liu, Jianjun Zhao, Meng Sun

Figure 1 for Towards Characterizing Adversarial Defects of Deep Learning Software from the Lens of Uncertainty
Figure 2 for Towards Characterizing Adversarial Defects of Deep Learning Software from the Lens of Uncertainty
Figure 3 for Towards Characterizing Adversarial Defects of Deep Learning Software from the Lens of Uncertainty
Figure 4 for Towards Characterizing Adversarial Defects of Deep Learning Software from the Lens of Uncertainty
Viaarxiv icon