[ICLR 2021] "Generating Adversarial Computer Programs using Optimized Obfuscations" by Shashank Srikant, Sijia Liu, Tamara Mitrovska, Shiyu Chang, Quanfu Fan, Gaoyuan Zhang, and Una-May O'Reilly
☆32Nov 15, 2021Updated 4 years ago
Alternatives and similar repositories for adversarial-code-generation
Users that are interested in adversarial-code-generation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Adversarial Robustness for Code☆16Mar 30, 2021Updated 5 years ago
- Releasing code for "ReCode: Robustness Evaluation of Code Generation Models"☆59Mar 20, 2024Updated 2 years ago
- ☆10Feb 9, 2019Updated 7 years ago
- The official codes for our paper at COLING 2022: Semantic-Preserving Adversarial Code Comprehension☆12Oct 23, 2022Updated 3 years ago
- Program Transformation Tool for Java Methods☆11Sep 16, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A collection of publications that works on code models but beyond focusing on the accuracies.☆13Jun 30, 2023Updated 2 years ago
- Replication Package for "Natural Attack for Pre-trained Models of Code", ICSE 2022☆52Nov 7, 2025Updated 6 months ago
- ☆41Jan 13, 2023Updated 3 years ago
- ☆16Mar 22, 2024Updated 2 years ago
- Contains the code and data for our #ICSE2022 paper titled as "CodeFill: Multi-token Code Completion by Jointly Learning from Structure an…☆15May 18, 2022Updated 4 years ago
- Official implementation of our work, 'GypSum: Learning Hybrid Representations for Code Summarization'.☆13Jan 20, 2022Updated 4 years ago
- ☆14Mar 3, 2022Updated 4 years ago
- This repo illustrates how to evaluate the artifacts in the paper An Extensive Study on Pre-trained Models for Program Understanding and G…☆27Aug 12, 2022Updated 3 years ago
- ☆18Mar 10, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Official repo for NeurIPS'24 paper "WAGLE: Strategic Weight Attribution for Effective and Modular Unlearning in Large Language Models"☆19Dec 16, 2024Updated last year
- Refazer: Learning Program Transformations from Examples☆30Mar 25, 2018Updated 8 years ago
- [SANER 2023] MixCode: Enhancing Code Classification by Mixup-Based Data Augmentation☆15Jul 13, 2024Updated last year
- ☆127Apr 22, 2023Updated 3 years ago
- JEMMA: An Extensible Java dataset for Many ML4Code Applications☆19Dec 12, 2022Updated 3 years ago
- Adversarial Attack for Pre-trained Code Models☆10Jul 19, 2022Updated 3 years ago
- ESRGAN E2E TFLite Tutorial☆18Aug 3, 2020Updated 5 years ago
- PyTorch's implementation of the code2seq model.☆62Jul 25, 2024Updated last year
- ☆18Jun 27, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆15Oct 2, 2024Updated last year
- Sketch Driven Regular Expression Generation.☆17Apr 26, 2023Updated 3 years ago
- ☆14May 7, 2024Updated 2 years ago
- Checks the PDFs submitted to a conference, e.g., for formatting violations and double anonymous violations☆68Dec 11, 2021Updated 4 years ago
- Code for ICML 2021 paper: How could Neural Networks understand Programs?☆123Nov 7, 2024Updated last year
- How to do mixup training from image files in Keras☆20Jan 13, 2019Updated 7 years ago
- Official repo for EMNLP'24 paper "SOUL: Unlocking the Power of Second-Order Optimization for LLM Unlearning"☆30Oct 1, 2024Updated last year
- The dataset for the variable-misuse task, used in the ICLR 2020 paper 'Global Relational Models of Source Code' [https://openreview.net/f…☆22Aug 19, 2020Updated 5 years ago
- [ICML22] "Revisiting and Advancing Fast Adversarial Training through the Lens of Bi-level Optimization" by Yihua Zhang*, Guanhua Zhang*, …☆64Oct 25, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- The implementation of the IJCAI 2018 paper: Code Completion with Neural Attention and Pointer Networks☆18Sep 11, 2019Updated 6 years ago
- Artifacts and other data for "Code Vectors: Understanding Programs Through Embedded Abstraced Symbolic Traces"☆22Jun 5, 2020Updated 5 years ago
- Git diff parser☆13Feb 18, 2015Updated 11 years ago
- Code for the AAAI 2023 paper "CodeAttack: Code-based Adversarial Attacks for Pre-Trained Programming Language Models☆35Apr 18, 2023Updated 3 years ago
- ☆14Nov 3, 2023Updated 2 years ago
- ☆10Mar 24, 2022Updated 4 years ago
- Code and data for XLCoST: A Benchmark Dataset for Cross-lingual Code Intelligence☆94Jan 21, 2025Updated last year