关注
Zhensu Sun
Zhensu Sun
在 smu.edu.sg 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Coprotector: Protect open-source code against unauthorized training usage with data poisoning
Z Sun, X Du, F Song, M Ni, L Li
Proceedings of the ACM Web Conference 2022, 652-660, 2022
572022
On the importance of building high-quality training datasets for neural code search
Z Sun, L Li, Y Liu, X Du, L Li
Proceedings of the 44th International Conference on Software Engineering …, 2022
552022
Req2lib: A semantic neural model for software library recommendation
Z Sun, Y Liu, Z Cheng, C Yang, P Che
2020 IEEE 27th international Conference on software analysis, evolution and …, 2020
232020
PSCS: A path-based neural model for semantic code search
Z Sun, Y Liu, C Yang, Y Qian
arXiv preprint arXiv:2008.03042, 2020
122020
Don't Complete It! Preventing Unhelpful Code Completion for Productive and Sustainable Neural Code Completion Systems
Z Sun, X Du, F Song, S Wang, M Ni, L Li
2023 IEEE/ACM 45th International Conference on Software Engineering …, 2023
9*2023
Robustness, security, privacy, explainability, efficiency, and usability of large language models for code
Z Yang, Z Sun, TZ Yue, P Devanbu, D Lo
arXiv preprint arXiv:2403.07506, 2024
82024
Codemark: Imperceptible watermarking for code datasets against neural code completion models
Z Sun, X Du, F Song, L Li
Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023
72023
Source Code Data Augmentation for Deep Learning: A Survey
TY Zhuo, Z Yang, Z Sun, Y Wang, L Li, X Du, Z Xing, D Lo
arXiv preprint arXiv:2305.19915, 2023
7*2023
Natural language to code: How far are we?
S Wang, M Geng, B Lin, Z Sun, M Wen, Y Liu, L Li, TF Bissyandé, X Mao
Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023
62023
When Neural Code Completion Models Size up the Situation: Attaining Cheaper and Faster Completion through Dynamic Model Inference
Z Sun, X Du, F Song, S Wang, L Li
Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024
32024
Two birds with one stone: Boosting code generation and code search via a generative adversarial network
S Wang, B Lin, Z Sun, M Wen, Y Liu, Y Lei, X Mao
Proceedings of the ACM on Programming Languages 7 (OOPSLA2), 486-515, 2023
32023
Fraud's Bargain Attack: Generating Adversarial Text Samples via Word Manipulation Process
M Ni, Z Sun, W Liu
IEEE Transactions on Knowledge and Data Engineering, 2024
1*2024
Fusing Code Searchers
S Wang, M Geng, B Lin, Z Sun, M Wen, Y Liu, L Li, TF Bissyandé, X Mao
IEEE Transactions on Software Engineering, 2024
2024
AI Coders Are Among Us: Rethinking Programming Language Grammar Towards Efficient Code Generation
Z Sun, X Du, Z Yang, L Li, D Lo
arXiv preprint arXiv:2404.16333, 2024
2024
Reversible jump attack to textual classifiers with modification reduction
M Ni, Z Sun, W Liu
Machine Learning, 1-31, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–15