The dataset, source code and the results of our ESEC/FSE 2023 paper "An Extensive Study on Adversarial Attack against Pre-trained Models of Code".
☆15Feb 19, 2024Updated 2 years ago
Alternatives and similar repositories for Attack_PTMC
Users that are interested in Attack_PTMC are comparing it to the libraries listed below
Sorting:
- We propose a novel adversarial example generation technique (i.e., CODA) for testing deep code models. Its key idea is to use code differ…☆19Oct 8, 2023Updated 2 years ago
- [ASE2024] Mutual Learning-Based Framework for Enhancing Robustness of Code Models via Adversarial Training☆11Sep 13, 2024Updated last year
- ☆18Mar 10, 2026Updated last week
- A skill that teaches LLM agents how to use rope for python codebase refactors☆37Dec 25, 2025Updated 2 months ago
- Python bindings for Comby☆13Nov 7, 2023Updated 2 years ago
- enchmarking Large Language Models' Resistance to Malicious Code☆14Dec 1, 2024Updated last year
- A First Look at Conventional Commits Classification☆13Nov 18, 2024Updated last year
- Code for the AAAI 2023 paper "CodeAttack: Code-based Adversarial Attacks for Pre-Trained Programming Language Models☆35Apr 18, 2023Updated 2 years ago
- The supplementary material for the paper "Fine-tuning Large Language Models to Improve Accuracy and Comprehensibility of Automated Code R…☆16Aug 12, 2024Updated last year
- Replication of AST Neural Network from Zhang J. et. al (2019) and application to software vulnerability detection☆12Jan 13, 2020Updated 6 years ago
- The official codes for our paper at COLING 2022: Semantic-Preserving Adversarial Code Comprehension☆12Oct 23, 2022Updated 3 years ago
- Artifact for TOSEM Submission: GiantRepair☆13Jun 26, 2024Updated last year
- ☆11Jul 2, 2025Updated 8 months ago
- ☆10Feb 1, 2023Updated 3 years ago
- This repository is for the paper of ICSE 2023: Regression Fuzzing for Deep Learning Systems☆12Feb 21, 2024Updated 2 years ago
- ☆21Oct 6, 2021Updated 4 years ago
- ☆14Feb 5, 2024Updated 2 years ago
- Exercises for practicing MLSec for Systems Security☆10Sep 2, 2024Updated last year
- Some of my report or course latex templates☆12Jan 25, 2022Updated 4 years ago
- ☆14Feb 26, 2025Updated last year
- ESEC/FSE'21: Prediction-Preserving Program Simplification☆10Oct 4, 2022Updated 3 years ago
- Programs for producing static and dynamic (runtime) call graphs for Java programs☆15Aug 23, 2021Updated 4 years ago
- Code and data for AAAI 2022 paper "Multilingual Code Snippets Training for Program Translation"☆10Mar 7, 2022Updated 4 years ago
- This is the official code repository for paper "Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code".☆17Sep 21, 2025Updated 6 months ago
- Replication Package for "Natural Attack for Pre-trained Models of Code", ICSE 2022☆52Nov 7, 2025Updated 4 months ago
- ☆17Dec 9, 2022Updated 3 years ago
- Adversarial Attack for Pre-trained Code Models☆10Jul 19, 2022Updated 3 years ago
- 「推荐算法学习+面试指南」一份涵盖大部分推荐算法工程师所需要掌握的核心知识。【目前更新就业面试的八股文询问内容】☆17Apr 27, 2023Updated 2 years ago
- the instructions about request access to AdvDroidZero☆13Apr 10, 2024Updated last year
- ☆12Oct 29, 2022Updated 3 years ago
- deep learning, malware detection, predictive uncertainty, dataset shift, calibration, uncertainty quantification, android malware☆16Nov 30, 2021Updated 4 years ago
- An SMB library in Go☆13Oct 27, 2022Updated 3 years ago
- ☆14Sep 28, 2023Updated 2 years ago
- ☆11Feb 19, 2024Updated 2 years ago
- A Comprehensive Study of Learning-based Android Malware Detectors under Challenging Environments☆14Apr 2, 2024Updated last year
- Improving IR-Based Bug Localization with Context-Aware Query Reformulation☆22Jan 20, 2021Updated 5 years ago
- Code associated with ICML (2024). "Defense against Backdoor Attack on Pre-trained Language Models via Head Pruning and Attention Normaliz…☆10Feb 22, 2026Updated 3 weeks ago
- ☆15Oct 19, 2021Updated 4 years ago
- Code for Doubly deformable aggregation of covariance matrices for few-shot segmentation☆16Oct 25, 2022Updated 3 years ago