default search action
Xiaoning Du 0001
Person information
- affiliation: Monash University, Clayton, VIC, Australia
- affiliation (PhD 2020): Nanyang Technological University, Singapore
Other persons with the same name
- Xiaoning Du 0002 — Xi'an Jiaotong University, Xi'an, China
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c27]Peter Ince, Xiapu Luo, Jiangshan Yu, Joseph K. Liu, Xiaoning Du:
Detect Llama - Finding Vulnerabilities in Smart Contracts Using Large Language Models. ACISP (3) 2024: 424-443 - [c26]Zhensu Sun, Xiaoning Du, Fu Song, Shangwen Wang, Li Li:
When Neural Code Completion Models Size up the Situation: Attaining Cheaper and Faster Completion through Dynamic Model Inference. ICSE 2024: 75:1-75:12 - [c25]Xiangwei Zhang, Junjie Wang, Xiaoning Du, Shuang Liu:
WasmCFuzz: Structure-aware Fuzzing for Wasm Compilers. EnCyCriS/SVM 2024: 1-5 - [c24]Zhensu Sun, Xiaoning Du, Xiapu Luo, Fu Song, David Lo, Li Li:
FDI: Attack Neural Code Generation Systems through User Feedback Channel. ISSTA 2024: 528-540 - [c23]Shuang Liu, Junhao Lan, Xiaoning Du, Jiyuan Li, Wei Lu, Jiajun Jiang, Xiaoyong Du:
Testing Graph Database Systems with Graph-State Persistence Oracle. ISSTA 2024: 666-677 - [c22]Zhensu Sun, Xiaoning Du, Zhou Yang, Li Li, David Lo:
AI Coders Are among Us: Rethinking Programming Language Grammar towards Efficient Code Generation. ISSTA 2024: 1124-1136 - [c21]Chao Wang, Tianming Liu, Yanjie Zhao, Lin Zhang, Xiaoning Du, Li Li, Haoyu Wang:
Towards Demystifying Android Adware: Dataset and Payload Location. ASE Workshops 2024: 167-175 - [c20]Triet Huynh Minh Le, Xiaoning Du, Muhammad Ali Babar:
Are Latent Vulnerabilities Hidden Gems for Software Vulnerability Prediction? An Empirical Study. MSR 2024: 716-727 - [i20]Zhensu Sun, Xiaoning Du, Fu Song, Shangwen Wang, Li Li:
When Neural Code Completion Models Size up the Situation: Attaining Cheaper and Faster Completion through Dynamic Model Inference. CoRR abs/2401.09964 (2024) - [i19]Triet Huynh Minh Le, Xiaoning Du, Muhammad Ali Babar:
Are Latent Vulnerabilities Hidden Gems for Software Vulnerability Prediction? An Empirical Study. CoRR abs/2401.11105 (2024) - [i18]Guangke Chen, Yedi Zhang, Fu Song, Ting Wang, Xiaoning Du, Yang Liu:
A Proactive and Dual Prevention Mechanism against Illegal Song Covers empowered by Singing Voice Conversion. CoRR abs/2401.17133 (2024) - [i17]Jiaolong Kong, Mingfei Cheng, Xiaofei Xie, Shangqing Liu, Xiaoning Du, Qi Guo:
ContrastRepair: Enhancing Conversation-Based Automated Program Repair via Contrastive Test Case Pairs. CoRR abs/2403.01971 (2024) - [i16]Zhensu Sun, Xiaoning Du, Zhou Yang, Li Li, David Lo:
AI Coders Are Among Us: Rethinking Programming Language Grammar Towards Efficient Code Generation. CoRR abs/2404.16333 (2024) - [i15]Terry Yue Zhuo, Minh Chien Vu, Jenny Chim, Han Hu, Wenhao Yu, Ratnadira Widyasari, Imam Nur Bani Yusuf, Haolan Zhan, Junda He, Indraneil Paul, Simon Brunner, Chen Gong, Thong Hoang, Armel Randy Zebaze, Xiaoheng Hong, Wen-Ding Li, Jean Kaddour, Ming Xu, Zhihan Zhang, Prateek Yadav, Naman Jain, Alex Gu, Zhoujun Cheng, Jiawei Liu, Qian Liu, Zijian Wang, David Lo, Binyuan Hui, Niklas Muennighoff, Daniel Fried, Xiaoning Du, Harm de Vries, Leandro von Werra:
BigCodeBench: Benchmarking Code Generation with Diverse Function Calls and Complex Instructions. CoRR abs/2406.15877 (2024) - [i14]Peter Ince, Xiapu Luo, Jiangshan Yu, Joseph K. Liu, Xiaoning Du:
Detect Llama - Finding Vulnerabilities in Smart Contracts using Large Language Models. CoRR abs/2407.08969 (2024) - [i13]Zhensu Sun, Haotian Zhu, Bowen Xu, Xiaoning Du, Li Li, David Lo:
LLM as Runtime Error Handler: A Promising Pathway to Adaptive Self-Healing of Software Systems. CoRR abs/2408.01055 (2024) - [i12]Zhensu Sun, Xiaoning Du, Xiapu Luo, Fu Song, David Lo, Li Li:
FDI: Attack Neural Code Generation Systems through User Feedback Channel. CoRR abs/2408.04194 (2024) - 2023
- [c19]Zhensu Sun, Xiaoning Du, Fu Song, Shangwen Wang, Mingze Ni, Li Li:
Don't Complete It! Preventing Unhelpful Code Completion for Productive and Sustainable Neural Code Completion Systems. ICSE Companion 2023: 324-325 - [c18]Longtian Wang, Xiaofei Xie, Xiaoning Du, Meng Tian, Qing Guo, Zheng Yang, Chao Shen:
DistXplore: Distribution-Guided Testing for Evaluating and Enhancing Deep Learning Systems. ESEC/SIGSOFT FSE 2023: 68-80 - [c17]Zhensu Sun, Xiaoning Du, Fu Song, Li Li:
CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models. ESEC/SIGSOFT FSE 2023: 1561-1572 - [c16]Peter Ince, Xiapu Luo, Jiangshan Yu, Joseph K. Liu, Xiaoning Du:
MATH - Finding and Fixing Exploits in Algorand. TrustCom 2023: 1572-1579 - [c15]Junjie Wang, Zhiyi Zhang, Shuang Liu, Xiaoning Du, Junjie Chen:
FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler. USENIX Security Symposium 2023: 1865-1882 - [i11]Terry Yue Zhuo, Zhou Yang, Zhensu Sun, Yufei Wang, Li Li, Xiaoning Du, Zhenchang Xing, David Lo:
Data Augmentation Approaches for Source Code Models: A Survey. CoRR abs/2305.19915 (2023) - [i10]Zhensu Sun, Xiaoning Du, Fu Song, Li Li:
CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models. CoRR abs/2308.14401 (2023) - [i9]Terry Yue Zhuo, Xiaoning Du, Zhenchang Xing, Jiamou Sun, Haowei Quan, Li Li, Liming Zhu:
Pop Quiz! Do Pre-trained Code Models Possess Knowledge of Correct API Names? CoRR abs/2309.07804 (2023) - 2022
- [j2]Chao Ren, Xiaoning Du, Yan Xu, Qun Song, Yang Liu, Rui Tan:
Vulnerability Analysis, Robustness Verification, and Mitigation Strategy for Machine Learning-Based Power System Stability Assessment Model Under Adversarial Examples. IEEE Trans. Smart Grid 13(2): 1622-1632 (2022) - [c14]Zhensu Sun, Li Li, Yan Liu, Xiaoning Du, Li Li:
On the Importance of Building High-quality Training Datasets for Neural Code Search. ICSE 2022: 1609-1620 - [c13]Haowei Quan, Jiawei Wang, Bo Li, Xiaoning Du, Kui Liu, Li Li:
Characterizing Python Method Evolution with PyMevol: An Essential Step Towards Enabling Reliable Software Systems. ISSRE Workshops 2022: 81-86 - [c12]Zhensu Sun, Xiaoning Du, Fu Song, Mingze Ni, Li Li:
CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning. WWW 2022: 652-660 - [i8]Zhensu Sun, Li Li, Yan Liu, Xiaoning Du, Li Li:
On the Importance of Building High-quality Training Datasets for Neural Code Search. CoRR abs/2202.06649 (2022) - [i7]Zhensu Sun, Xiaoning Du, Fu Song, Shangwen Wang, Mingze Ni, Li Li:
Learning to Prevent Profitless Neural Code Completion. CoRR abs/2209.05948 (2022) - 2021
- [j1]Xiaoning Du, Alwen Tiu, Kun Cheng, Yang Liu:
Trace-Length Independent Runtime Monitoring of Quantitative Policies. IEEE Trans. Dependable Secur. Comput. 18(3): 1489-1510 (2021) - [c11]Xiyue Zhang, Xiaoning Du, Xiaofei Xie, Lei Ma, Yang Liu, Meng Sun:
Decision-Guided Weighted Automata Extraction from Recurrent Neural Networks. AAAI 2021: 11699-11707 - [c10]Guangke Chen, Sen Chen, Lingling Fan, Xiaoning Du, Zhe Zhao, Fu Song, Yang Liu:
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. SP 2021: 694-711 - [i6]Zhensu Sun, Xiaoning Du, Fu Song, Mingze Ni, Li Li:
CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning. CoRR abs/2110.12925 (2021) - 2020
- [b1]Xiaoning Du:
Towards secure and robust stateful deep learning systems with model-based analysis. Nanyang Technological University, Singapore, 2020 - [c9]Xiyue Zhang, Xiaofei Xie, Lei Ma, Xiaoning Du, Qiang Hu, Yang Liu, Jianjun Zhao, Meng Sun:
Towards characterizing adversarial defects of deep learning software from the lens of uncertainty. ICSE 2020: 739-751 - [c8]Xiaoning Du, Yi Li, Xiaofei Xie, Lei Ma, Yang Liu, Jianjun Zhao:
Marble: Model-based Robustness Analysis of Stateful Deep Learning Systems. ASE 2020: 423-435 - [i5]Xiyue Zhang, Xiaofei Xie, Lei Ma, Xiaoning Du, Qiang Hu, Yang Liu, Jianjun Zhao, Meng Sun:
Towards Characterizing Adversarial Defects of Deep Learning Software from the Lens of Uncertainty. CoRR abs/2004.11573 (2020)
2010 – 2019
- 2019
- [c7]Xiaoning Du, Bihuan Chen, Yuekang Li, Jianmin Guo, Yaqin Zhou, Yang Liu, Yu Jiang:
Leopard: identifying vulnerable code for vulnerability assessment through program metrics. ICSE 2019: 60-71 - [c6]Xiaoning Du:
Marvel: a generic, scalable and effective vulnerability detection platform. ICSE (Companion Volume) 2019: 129-131 - [c5]Xiaoning Du, Xiaofei Xie, Yi Li, Lei Ma, Yang Liu, Jianjun Zhao:
A Quantitative Analysis Framework for Recurrent Neural Network. ASE 2019: 1062-1065 - [c4]Yaqin Zhou, Shangqing Liu, Jing Kai Siow, Xiaoning Du, Yang Liu:
Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks. NeurIPS 2019: 10197-10207 - [c3]Xiaoning Du, Xiaofei Xie, Yi Li, Lei Ma, Yang Liu, Jianjun Zhao:
DeepStellar: model-based quantitative analysis of stateful deep learning systems. ESEC/SIGSOFT FSE 2019: 477-487 - [i4]Xiaoning Du, Bihuan Chen, Yuekang Li, Jianmin Guo, Yaqin Zhou, Yang Liu, Yu Jiang:
LEOPARD: Identifying Vulnerable Code for Vulnerability Assessment through Program Metrics. CoRR abs/1901.11479 (2019) - [i3]Yaqin Zhou, Shangqing Liu, Jing Kai Siow, Xiaoning Du, Yang Liu:
Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks. CoRR abs/1909.03496 (2019) - [i2]Guangke Chen, Sen Chen, Lingling Fan, Xiaoning Du, Zhe Zhao, Fu Song, Yang Liu:
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. CoRR abs/1911.01840 (2019) - 2018
- [c2]Xiaoning Du:
Towards Building a Generic Vulnerability Detection Platform by Combining Scalable Attacking Surface Analysis and Directed Fuzzing. ICFEM 2018: 464-468 - [i1]Xiaoning Du, Xiaofei Xie, Yi Li, Lei Ma, Jianjun Zhao, Yang Liu:
DeepCruiser: Automated Guided Testing for Stateful Deep Learning Systems. CoRR abs/1812.05339 (2018) - 2015
- [c1]Xiaoning Du, Yang Liu, Alwen Tiu:
Trace-Length Independent Runtime Monitoring of Quantitative Policies in LTL. FM 2015: 231-247
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 20:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint