Alert button
Picture for Zhensu Sun

Zhensu Sun

Alert button

Reversible Jump Attack to Textual Classifiers with Modification Reduction

Add code
Bookmark button
Alert button
Mar 21, 2024
Mingze Ni, Zhensu Sun, Wei Liu

Viaarxiv icon

When Neural Code Completion Models Size up the Situation: Attaining Cheaper and Faster Completion through Dynamic Model Inference

Add code
Bookmark button
Alert button
Jan 18, 2024
Zhensu Sun, Xiaoning Du, Fu Song, Shangwen Wang, Li Li

Viaarxiv icon

CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models

Add code
Bookmark button
Alert button
Aug 28, 2023
Zhensu Sun, Xiaoning Du, Fu Song, Li Li

Figure 1 for CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models
Figure 2 for CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models
Figure 3 for CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models
Figure 4 for CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models
Viaarxiv icon

Data Augmentation Approaches for Source Code Models: A Survey

Add code
Bookmark button
Alert button
Jun 12, 2023
Terry Yue Zhuo, Zhou Yang, Zhensu Sun, Yufei Wang, Li Li, Xiaoning Du, Zhenchang Xing, David Lo

Figure 1 for Data Augmentation Approaches for Source Code Models: A Survey
Figure 2 for Data Augmentation Approaches for Source Code Models: A Survey
Figure 3 for Data Augmentation Approaches for Source Code Models: A Survey
Figure 4 for Data Augmentation Approaches for Source Code Models: A Survey
Viaarxiv icon

Frauds Bargain Attack: Generating Adversarial Text Samples via Word Manipulation Process

Add code
Bookmark button
Alert button
Mar 01, 2023
Mingze Ni, Zhensu Sun, Wei Liu

Figure 1 for Frauds Bargain Attack: Generating Adversarial Text Samples via Word Manipulation Process
Figure 2 for Frauds Bargain Attack: Generating Adversarial Text Samples via Word Manipulation Process
Figure 3 for Frauds Bargain Attack: Generating Adversarial Text Samples via Word Manipulation Process
Figure 4 for Frauds Bargain Attack: Generating Adversarial Text Samples via Word Manipulation Process
Viaarxiv icon

Learning to Prevent Profitless Neural Code Completion

Add code
Bookmark button
Alert button
Sep 13, 2022
Zhensu Sun, Xiaoning Du, Fu Song, Shangwen Wang, Mingze Ni, Li Li

Figure 1 for Learning to Prevent Profitless Neural Code Completion
Figure 2 for Learning to Prevent Profitless Neural Code Completion
Figure 3 for Learning to Prevent Profitless Neural Code Completion
Figure 4 for Learning to Prevent Profitless Neural Code Completion
Viaarxiv icon

On the Importance of Building High-quality Training Datasets for Neural Code Search

Add code
Bookmark button
Alert button
Feb 14, 2022
Zhensu Sun, Li Li, Yan Liu, Xiaoning Du, Li Li

Figure 1 for On the Importance of Building High-quality Training Datasets for Neural Code Search
Figure 2 for On the Importance of Building High-quality Training Datasets for Neural Code Search
Figure 3 for On the Importance of Building High-quality Training Datasets for Neural Code Search
Figure 4 for On the Importance of Building High-quality Training Datasets for Neural Code Search
Viaarxiv icon

CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning

Add code
Bookmark button
Alert button
Oct 25, 2021
Zhensu Sun, Xiaoning Du, Fu Song, Mingze Ni, Li Li

Figure 1 for CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning
Figure 2 for CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning
Figure 3 for CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning
Figure 4 for CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning
Viaarxiv icon

Req2Lib: A Semantic Neural Model for Software Library Recommendation

Add code
Bookmark button
Alert button
May 24, 2020
Zhensu Sun, Yan Liu, Ziming Cheng, Chen Yang, Pengyu Che

Figure 1 for Req2Lib: A Semantic Neural Model for Software Library Recommendation
Figure 2 for Req2Lib: A Semantic Neural Model for Software Library Recommendation
Figure 3 for Req2Lib: A Semantic Neural Model for Software Library Recommendation
Figure 4 for Req2Lib: A Semantic Neural Model for Software Library Recommendation
Viaarxiv icon