Search Results for author: Xiaoning Du

Found 14 papers, 8 papers with code

A Proactive and Dual Prevention Mechanism against Illegal Song Covers empowered by Singing Voice Conversion

no code implementations30 Jan 2024 Guangke Chen, Yedi Zhang, Fu Song, Ting Wang, Xiaoning Du, Yang Liu

To improve the imperceptibility of perturbations, we refine a psychoacoustic model-based loss with the backing track as an additional masker, a unique accompanying element for singing voices compared to ordinary speech voices.

Voice Conversion

Are Latent Vulnerabilities Hidden Gems for Software Vulnerability Prediction? An Empirical Study

1 code implementation20 Jan 2024 Triet H. M. Le, Xiaoning Du, M. Ali Babar

To bridge these gaps, we conduct a large-scale study on the latent vulnerable functions in two commonly used SV datasets and their utilization for function-level and line-level SV predictions.

When Neural Code Completion Models Size up the Situation: Attaining Cheaper and Faster Completion through Dynamic Model Inference

1 code implementation18 Jan 2024 Zhensu Sun, Xiaoning Du, Fu Song, Shangwen Wang, Li Li

These findings motivate our exploration of dynamic inference in code completion and inspire us to enhance it with a decision-making mechanism that stops the generation of incorrect code.

Code Completion Decision Making

Pop Quiz! Do Pre-trained Code Models Possess Knowledge of Correct API Names?

no code implementations14 Sep 2023 Terry Yue Zhuo, Xiaoning Du, Zhenchang Xing, Jiamou Sun, Haowei Quan, Li Li, Liming Zhu

The correctness and unambiguity of API usage among these code models are crucial for achieving desirable program functionalities, requiring them to learn various API fully qualified names structurally and semantically.

Code Generation Knowledge Probing

CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models

1 code implementation28 Aug 2023 Zhensu Sun, Xiaoning Du, Fu Song, Li Li

Even worse, the ``black-box'' nature of neural models sets a high barrier for externals to audit their training datasets, which further connives these unauthorized usages.

Code Completion Specificity

Source Code Data Augmentation for Deep Learning: A Survey

1 code implementation31 May 2023 Terry Yue Zhuo, Zhou Yang, Zhensu Sun, YuFei Wang, Li Li, Xiaoning Du, Zhenchang Xing, David Lo

This paper fills this gap by conducting a comprehensive and integrative survey of data augmentation for source code, wherein we systematically compile and encapsulate existing literature to provide a comprehensive overview of the field.

Data Augmentation

Don't Complete It! Preventing Unhelpful Code Completion for Productive and Sustainable Neural Code Completion Systems

no code implementations13 Sep 2022 Zhensu Sun, Xiaoning Du, Fu Song, Shangwen Wang, Mingze Ni, Li Li

The experimental results show that the proposed estimator helps save 23. 3% of computational cost measured in floating-point operations for the code completion systems, and 80. 2% of rejected prompts lead to unhelpful completion

Code Completion

On the Importance of Building High-quality Training Datasets for Neural Code Search

1 code implementation14 Feb 2022 Zhensu Sun, Yan Liu, Xiaoning Du, Li Li

The performance of neural code search is significantly influenced by the quality of the training data from which the neural models are derived.

Code Search Retrieval

CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning

1 code implementation25 Oct 2021 Zhensu Sun, Xiaoning Du, Fu Song, Mingze Ni, Li Li

Github Copilot, trained on billions of lines of public code, has recently become the buzzword in the computer science research and practice community.

Data Poisoning

Towards Characterizing Adversarial Defects of Deep Learning Software from the Lens of Uncertainty

no code implementations24 Apr 2020 Xiyue Zhang, Xiaofei Xie, Lei Ma, Xiaoning Du, Qiang Hu, Yang Liu, Jianjun Zhao, Meng Sun

Based on this, we propose an automated testing technique to generate multiple types of uncommon AEs and BEs that are largely missed by existing techniques.

Adversarial Attack

Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems

1 code implementation3 Nov 2019 Guangke Chen, Sen Chen, Lingling Fan, Xiaoning Du, Zhe Zhao, Fu Song, Yang Liu

In this paper, we conduct the first comprehensive and systematic study of the adversarial attacks on SR systems (SRSs) to understand their security weakness in the practical blackbox setting.

Adversarial Attack Speaker Recognition +2

LEOPARD: Identifying Vulnerable Code for Vulnerability Assessment through Program Metrics

no code implementations31 Jan 2019 Xiaoning Du, Bihuan Chen, Yuekang Li, Jianmin Guo, Yaqin Zhou, Yang Liu, Yu Jiang

The latter needs the prior knowledge of known vulnerabilities and can only identify similar but not new types of vulnerabilities.

Software Engineering

DeepCruiser: Automated Guided Testing for Stateful Deep Learning Systems

no code implementations13 Dec 2018 Xiaoning Du, Xiaofei Xie, Yi Li, Lei Ma, Jianjun Zhao, Yang Liu

Our in-depth evaluation on a state-of-the-art speech-to-text DL system demonstrates the effectiveness of our technique in improving quality and reliability of stateful DL systems.

Cannot find the paper you are looking for? You can Submit a new open access paper.