CGCL-codes / Attack_PTMC
The dataset, source code and the results of our ESEC/FSE 2023 paper "An Extensive Study on Adversarial Attack against Pre-trained Models of Code".
☆14Updated last year
Alternatives and similar repositories for Attack_PTMC:
Users that are interested in Attack_PTMC are comparing it to the libraries listed below
- We propose a novel adversarial example generation technique (i.e., CODA) for testing deep code models. Its key idea is to use code differ…☆14Updated last year
- ☆10Updated 11 months ago
- ☆45Updated 2 years ago
- The replication package of paper "Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks"☆23Updated last year
- When Less is Enough: Positive-Unlabeled Learning Model for Vulnerability Detection☆12Updated last year
- ☆12Updated last year
- This is the tool released in ICSE 2024 paper "Domain Knowledge Matters: Improving Prompts with Fix Templates for Repairing Python Type Er…☆16Updated last year
- We propose a novel DL-based mutation technique (LEAM), which adapts the syntax-guided encoder-decoder architecture to build two sub-model…☆27Updated 10 months ago
- [SANER 2023] MixCode: Enhancing Code Classification by Mixup-Based Data Augmentation☆15Updated 9 months ago
- ☆12Updated 2 years ago
- VulRepair: A T5-Based Automated Software Vulnerability Repair☆77Updated last month
- [ICSE 2024 Industry Challenge Track] Official implementation of "ReposVul: A Repository-Level High-Quality Vulnerability Dataset".☆60Updated 4 months ago
- ☆22Updated 6 months ago
- MegaVul - The largest, high-quality, extensible, continuously updated, C/C++/Java vulnerability dataset☆67Updated 3 months ago
- Replication Package for "Natural Attack for Pre-trained Models of Code", ICSE 2022☆46Updated 8 months ago
- Towards Robustness of Deep Program Processing Models – Detection, Estimation and Enhancement☆19Updated 2 years ago
- ☆74Updated last year
- ☆11Updated last year
- ☆14Updated last year
- An implementation of the ACL 2024 Findings paper "Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tu…☆38Updated 10 months ago
- ☆16Updated 9 months ago
- Code for the paper - Source Code Vulnerability Detection: Combining Code Language Models and Code Property Graph☆72Updated last year
- Backdooring Neural Code Search☆13Updated last year
- ☆9Updated last year
- This is the official code repository for paper "Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code".☆9Updated 8 months ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆63Updated last year
- ☆14Updated 3 years ago
- SeqTrans: Automatic Vulnerability Fix via Sequence to Sequence Learning☆17Updated 3 years ago
- For our ISSTA23 paper "How Effective are Neural Networks for Fixing Security Vulnerabilities?" by Yi Wu, Nan Jiang, Hung Viet Pham, Thiba…☆36Updated last year
- ☆12Updated last year