Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks Y Zhou, S Liu, J Siow, X Du, Y Liu https://arxiv.org/abs/1909.03496, 2019 | 783 | 2019 |
Who is real bob? adversarial attacks on speaker recognition systems G Chen, S Chenb, L Fan, X Du, Z Zhao, F Song, Y Liu 2021 IEEE Symposium on Security and Privacy (SP), 694-711, 2021 | 212 | 2021 |
Deepstellar: Model-based quantitative analysis of stateful deep learning systems X Du, X Xie, Y Li, L Ma, Y Liu, J Zhao Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019 | 198* | 2019 |
Leopard: Identifying vulnerable code for vulnerability assessment through program metrics X Du, B Chen, Y Li, J Guo, Y Zhou, Y Liu, Y Jiang 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019 | 114 | 2019 |
Towards characterizing adversarial defects of deep learning software from the lens of uncertainty X Zhang, X Xie, L Ma, X Du, Q Hu, Y Liu, J Zhao, M Sun Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 84 | 2020 |
Coprotector: Protect open-source code against unauthorized training usage with data poisoning Z Sun, X Du, F Song, M Ni, L Li Proceedings of the ACM Web Conference 2022, 652-660, 2022 | 57 | 2022 |
On the importance of building high-quality training datasets for neural code search Z Sun, L Li, Y Liu, X Du, L Li Proceedings of the 44th International Conference on Software Engineering …, 2022 | 53 | 2022 |
Vulnerability analysis, robustness verification, and mitigation strategy for machine learning-based power system stability assessment model under adversarial examples C Ren, X Du, Y Xu, Q Song, Y Liu, R Tan IEEE Transactions on Smart Grid 13 (2), 1622-1632, 2021 | 25 | 2021 |
Marble: Model-based robustness analysis of stateful deep learning systems X Du, Y Li, X Xie, L Ma, Y Liu, J Zhao Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020 | 21 | 2020 |
Decision-guided weighted automata extraction from recurrent neural networks X Zhang, X Du, X Xie, L Ma, Y Liu, M Sun Proceedings of the AAAI Conference on Artificial Intelligence 35 (13), 11699 …, 2021 | 20 | 2021 |
A quantitative analysis framework for recurrent neural network X Du, X Xie, Y Li, L Ma, Y Liu, J Zhao 2019 34th IEEE/ACM International Conference on Automated Software …, 2019 | 16 | 2019 |
Trace-length independent runtime monitoring of quantitative policies in LTL X Du, Y Liu, A Tiu FM 2015: Formal Methods: 20th International Symposium, Oslo, Norway, June 24 …, 2015 | 15 | 2015 |
{FuzzJIT}:{Oracle-Enhanced} Fuzzing for {JavaScript} Engine {JIT} Compiler J Wang, Z Zhang, S Liu, X Du, J Chen 32nd USENIX Security Symposium (USENIX Security 23), 1865-1882, 2023 | 14 | 2023 |
Don't Complete It! Preventing Unhelpful Code Completion for Productive and Sustainable Neural Code Completion Systems Z Sun, X Du, F Song, S Wang, M Ni, L Li 2023 IEEE/ACM 45th International Conference on Software Engineering …, 2023 | 8 | 2023 |
Codemark: Imperceptible watermarking for code datasets against neural code completion models Z Sun, X Du, F Song, L Li Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023 | 7 | 2023 |
Trace-length independent runtime monitoring of quantitative policies X Du, A Tiu, K Cheng, Y Liu IEEE Transactions on Dependable and Secure Computing 18 (3), 1489-1510, 2019 | 7 | 2019 |
Data augmentation approaches for source code models: A survey TY Zhuo, Z Yang, Z Sun, Y Wang, L Li, X Du, Z Xing, D Lo arXiv preprint arXiv:2305.19915, 2023 | 6 | 2023 |
Contrastrepair: Enhancing conversation-based automated program repair via contrastive test case pairs J Kong, M Cheng, X Xie, S Liu, X Du, Q Guo arXiv preprint arXiv:2403.01971, 2024 | 5 | 2024 |
When Neural Code Completion Models Size up the Situation: Attaining Cheaper and Faster Completion through Dynamic Model Inference Z Sun, X Du, F Song, S Wang, L Li Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024 | 3 | 2024 |
Towards building a generic vulnerability detection platform by combining scalable attacking surface analysis and directed fuzzing X Du Formal Methods and Software Engineering: 20th International Conference on …, 2018 | 3 | 2018 |