Search Results for author: Xiaoning Du

Found 18 papers, 11 papers with code

LLM as Runtime Error Handler: A Promising Pathway to Adaptive Self-Healing of Software Systems

no code implementations2 Aug 2024 Zhensu Sun, Haotian Zhu, Bowen Xu, Xiaoning Du, Li Li, David Lo

Inspired by their remarkable capabilities in understanding and generating code, we propose to deal with the runtime errors in a real-time manner using LLMs.

BigCodeBench: Benchmarking Code Generation with Diverse Function Calls and Complex Instructions

2 code implementations22 Jun 2024 Terry Yue Zhuo, Minh Chien Vu, Jenny Chim, Han Hu, Wenhao Yu, Ratnadira Widyasari, Imam Nur Bani Yusuf, Haolan Zhan, Junda He, Indraneil Paul, Simon Brunner, Chen Gong, Thong Hoang, Armel Randy Zebaze, Xiaoheng Hong, Wen-Ding Li, Jean Kaddour, Ming Xu, Zhihan Zhang, Prateek Yadav, Naman jain, Alex Gu, Zhoujun Cheng, Jiawei Liu, Qian Liu, Zijian Wang, David Lo, Binyuan Hui, Niklas Muennighoff, Daniel Fried, Xiaoning Du, Harm de Vries, Leandro von Werra

Fulfilling both of these characteristics can pose a great challenge for LLMs. To assess how well LLMs can solve challenging and practical tasks via programs, we introduce BigCodeBench, a benchmark that challenges LLMs to invoke multiple function calls as tools from 139 libraries and 7 domains for 1, 140 fine-grained tasks.

Benchmarking Code Generation

AI Coders Are Among Us: Rethinking Programming Language Grammar Towards Efficient Code Generation

1 code implementation25 Apr 2024 Zhensu Sun, Xiaoning Du, Zhou Yang, Li Li, David Lo

To improve inference efficiency and reduce computational costs, we propose the concept of AI-oriented grammar.

Code Generation Math

SongBsAb: A Dual Prevention Approach against Singing Voice Conversion based Illegal Song Covers

no code implementations30 Jan 2024 Guangke Chen, Yedi Zhang, Fu Song, Ting Wang, Xiaoning Du, Yang Liu

Perturbations are carefully crafted to (1) provide a dual prevention, i. e., preventing the singing voice from being used as the source and target singing voice in SVC, by proposing a gender-transformation loss and a high/low hierarchy multi-target loss, respectively; and (2) be harmless, i. e., no side-effect on the enjoyment of protected songs, by refining a psychoacoustic model-based loss with the backing track as an additional masker, a unique accompanying element for singing voices compared to ordinary speech voices.

Voice Conversion

Are Latent Vulnerabilities Hidden Gems for Software Vulnerability Prediction? An Empirical Study

1 code implementation20 Jan 2024 Triet H. M. Le, Xiaoning Du, M. Ali Babar

To bridge these gaps, we conduct a large-scale study on the latent vulnerable functions in two commonly used SV datasets and their utilization for function-level and line-level SV predictions.

When Neural Code Completion Models Size up the Situation: Attaining Cheaper and Faster Completion through Dynamic Model Inference

1 code implementation18 Jan 2024 Zhensu Sun, Xiaoning Du, Fu Song, Shangwen Wang, Li Li

These findings motivate our exploration of dynamic inference in code completion and inspire us to enhance it with a decision-making mechanism that stops the generation of incorrect code.

Code Completion Decision Making

Pop Quiz! Do Pre-trained Code Models Possess Knowledge of Correct API Names?

no code implementations14 Sep 2023 Terry Yue Zhuo, Xiaoning Du, Zhenchang Xing, Jiamou Sun, Haowei Quan, Li Li, Liming Zhu

The correctness and unambiguity of API usage among these code models are crucial for achieving desirable program functionalities, requiring them to learn various API fully qualified names structurally and semantically.

Code Generation Knowledge Probing

CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models

1 code implementation28 Aug 2023 Zhensu Sun, Xiaoning Du, Fu Song, Li Li

Even worse, the ``black-box'' nature of neural models sets a high barrier for externals to audit their training datasets, which further connives these unauthorized usages.

Code Completion Specificity

Source Code Data Augmentation for Deep Learning: A Survey

1 code implementation31 May 2023 Terry Yue Zhuo, Zhou Yang, Zhensu Sun, YuFei Wang, Li Li, Xiaoning Du, Zhenchang Xing, David Lo

This paper fills this gap by conducting a comprehensive and integrative survey of data augmentation for source code, wherein we systematically compile and encapsulate existing literature to provide a comprehensive overview of the field.

Data Augmentation Deep Learning +1

Don't Complete It! Preventing Unhelpful Code Completion for Productive and Sustainable Neural Code Completion Systems

1 code implementation13 Sep 2022 Zhensu Sun, Xiaoning Du, Fu Song, Shangwen Wang, Mingze Ni, Li Li, David Lo

To fill this significant gap, we first investigate the prompts of unhelpful code completions, called "low-return prompts".

Code Completion

On the Importance of Building High-quality Training Datasets for Neural Code Search

1 code implementation14 Feb 2022 Zhensu Sun, Yan Liu, Xiaoning Du, Li Li

The performance of neural code search is significantly influenced by the quality of the training data from which the neural models are derived.

Code Search Retrieval

CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning

1 code implementation25 Oct 2021 Zhensu Sun, Xiaoning Du, Fu Song, Mingze Ni, Li Li

Github Copilot, trained on billions of lines of public code, has recently become the buzzword in the computer science research and practice community.

Data Poisoning Deep Learning

Towards Characterizing Adversarial Defects of Deep Learning Software from the Lens of Uncertainty

no code implementations24 Apr 2020 Xiyue Zhang, Xiaofei Xie, Lei Ma, Xiaoning Du, Qiang Hu, Yang Liu, Jianjun Zhao, Meng Sun

Based on this, we propose an automated testing technique to generate multiple types of uncommon AEs and BEs that are largely missed by existing techniques.

Adversarial Attack

Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems

1 code implementation3 Nov 2019 Guangke Chen, Sen Chen, Lingling Fan, Xiaoning Du, Zhe Zhao, Fu Song, Yang Liu

In this paper, we conduct the first comprehensive and systematic study of the adversarial attacks on SR systems (SRSs) to understand their security weakness in the practical blackbox setting.

Adversarial Attack Speaker Recognition +2

LEOPARD: Identifying Vulnerable Code for Vulnerability Assessment through Program Metrics

no code implementations31 Jan 2019 Xiaoning Du, Bihuan Chen, Yuekang Li, Jianmin Guo, Yaqin Zhou, Yang Liu, Yu Jiang

The latter needs the prior knowledge of known vulnerabilities and can only identify similar but not new types of vulnerabilities.

Software Engineering

DeepCruiser: Automated Guided Testing for Stateful Deep Learning Systems

no code implementations13 Dec 2018 Xiaoning Du, Xiaofei Xie, Yi Li, Lei Ma, Jianjun Zhao, Yang Liu

Our in-depth evaluation on a state-of-the-art speech-to-text DL system demonstrates the effectiveness of our technique in improving quality and reliability of stateful DL systems.

Deep Learning

Cannot find the paper you are looking for? You can Submit a new open access paper.