☆32Jul 6, 2023Updated 2 years ago
Alternatives and similar repositories for code-imitator
Users that are interested in code-imitator are comparing it to the libraries listed below
Sorting:
- ☆16May 23, 2023Updated 2 years ago
- [WIP] A tool for C++ code modification to augment data for clone detection tools☆10Jan 13, 2026Updated last month
- ☆11Jul 8, 2024Updated last year
- Repository for the Adversarial ML on Code things☆16Jun 25, 2020Updated 5 years ago
- CodeMind is a generic framework for evaluating inductive code reasoning of LLMs. It is equipped with a static analysis component that ena…☆42Feb 18, 2026Updated last week
- Smart Contract Vulnerability Detection Using Graph Neural Networks☆17Jun 22, 2020Updated 5 years ago
- Adversarial Robustness for Code☆16Mar 30, 2021Updated 4 years ago
- Code for the paper: "Adversarial Examples for Models of Code"☆18Nov 16, 2020Updated 5 years ago
- adversarial malware detection via a principled way☆24Apr 27, 2023Updated 2 years ago
- This repository contains code and data of the paper **On the Limitations of Continual Learning for Malware Classification**, accepted to …☆19Dec 29, 2023Updated 2 years ago
- Generating Adversarial Examples for Holding Robustness of Source Code Processing Models☆14Dec 2, 2021Updated 4 years ago
- ☆18Apr 4, 2021Updated 4 years ago
- Adversarial Examples on KNN (and its neural network friends)☆20Mar 19, 2020Updated 5 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆53Apr 15, 2025Updated 10 months ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆60Apr 29, 2022Updated 3 years ago
- ☆27Jan 17, 2024Updated 2 years ago
- ☆61Dec 21, 2023Updated 2 years ago
- Collected solutions from Google Code Jam programming competition (2008-2021).☆68Sep 19, 2024Updated last year
- Supervised Local Modeling for Interpretability☆29Oct 27, 2018Updated 7 years ago
- Code for paper "SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations" (IEEE S&P 2024)☆33Aug 8, 2024Updated last year
- A curated list of malware-related papers.☆34Feb 28, 2024Updated last year
- IST'21 & SANER'22: Semantic-Preserving Program Transformations☆31Oct 25, 2022Updated 3 years ago
- Papers, code and datasets about deep learning for Android malware defenses and malware detection☆147Nov 21, 2023Updated 2 years ago
- CFG based program similarity using Graph Neural Networks☆36Mar 21, 2023Updated 2 years ago
- A pass that can generate PDG(in *.dot) for LLVM.☆36Aug 16, 2016Updated 9 years ago
- ☆11Aug 21, 2017Updated 8 years ago
- 👀 VITRina: VIsual Token Representations☆11Jun 15, 2023Updated 2 years ago
- ☆13Oct 11, 2024Updated last year
- This is the project repository for the paper "Understanding the Automated Parameter Optimization on Transfer Learning for Cross-Project D…☆10Mar 26, 2020Updated 5 years ago
- Code of On L-p Robustness of Decision Stumps and Trees, ICML 2020☆10Aug 3, 2020Updated 5 years ago
- Web Application Firewall Benchmark☆12May 14, 2022Updated 3 years ago
- A series of classic oblivious algorithms written in Python, covering oblivious RAM, oblivious MAP, and oblivious graph processing for cli…☆13Feb 13, 2026Updated 2 weeks ago
- Convert ML Models to Flask + Gunicorn + Docker Service.☆12Oct 15, 2022Updated 3 years ago
- Panda - is a set of utilities used to research how PsExec encrypts its traffic.☆12Apr 20, 2021Updated 4 years ago
- ☆14Feb 5, 2024Updated 2 years ago
- The dataset, source code and the results of our ESEC/FSE 2023 paper "An Extensive Study on Adversarial Attack against Pre-trained Models …☆15Feb 19, 2024Updated 2 years ago
- ☆43Jun 14, 2022Updated 3 years ago
- ☆11Aug 28, 2024Updated last year
- BLEU Score in Rust☆12Jan 1, 2026Updated last month