☆33Jul 6, 2023Updated 2 years ago
Alternatives and similar repositories for code-imitator
Users that are interested in code-imitator are comparing it to the libraries listed below
Sorting:
- ☆16May 23, 2023Updated 2 years ago
- Generating Adversarial Examples for Holding Robustness of Source Code Processing Models☆15Dec 2, 2021Updated 4 years ago
- Ungrafting Malicious Code from Piggybacked Android Apps☆14Sep 27, 2016Updated 9 years ago
- Repository for the Adversarial ML on Code things☆16Jun 25, 2020Updated 5 years ago
- [WIP] A tool for C++ code modification to augment data for clone detection tools☆10Jan 13, 2026Updated 2 months ago
- CodeMind is a generic framework for evaluating inductive code reasoning of LLMs. It is equipped with a static analysis component that ena…☆42Feb 18, 2026Updated last month
- The dataset and source code for CugLM☆15Sep 1, 2020Updated 5 years ago
- ☆11Apr 23, 2023Updated 2 years ago
- ☆11Jul 8, 2024Updated last year
- Additional code and data for the automated malware generation paper☆13May 4, 2024Updated last year
- ☆18Apr 4, 2021Updated 4 years ago
- adversarial malware detection via a principled way☆24Apr 27, 2023Updated 2 years ago
- Adversarial Examples on KNN (and its neural network friends)☆20Mar 19, 2020Updated 6 years ago
- Programmer De-anonymization via Code Stylometry☆79Sep 1, 2017Updated 8 years ago
- The official codes for our paper at COLING 2022: Semantic-Preserving Adversarial Code Comprehension☆12Oct 23, 2022Updated 3 years ago
- Smart Contract Vulnerability Detection Using Graph Neural Networks☆17Jun 22, 2020Updated 5 years ago
- [S&P'24] Test-Time Poisoning Attacks Against Test-Time Adaptation Models☆19Feb 18, 2025Updated last year
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated 2 months ago
- ☆61Dec 21, 2023Updated 2 years ago
- This repository contains code and data of the paper **On the Limitations of Continual Learning for Malware Classification**, accepted to …☆19Dec 29, 2023Updated 2 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆54Apr 15, 2025Updated 11 months ago
- ☆28Jan 17, 2024Updated 2 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆60Apr 29, 2022Updated 3 years ago
- Codebase for Context-aware Meta-learned Loss Scaling (CaMeLS). https://arxiv.org/abs/2305.15076.☆25Jan 23, 2024Updated 2 years ago
- Implementing SDN based VANET simulated on Mininet-Wifi nodes - Socket programming to implement functionality as an application☆10Feb 22, 2019Updated 7 years ago
- A curated list of malware-related papers.☆34Feb 28, 2024Updated 2 years ago
- ☆11Jul 2, 2025Updated 8 months ago
- Backdooring Neural Code Search☆14Sep 8, 2023Updated 2 years ago
- Collected solutions from Google Code Jam programming competition (2008-2021).☆68Sep 19, 2024Updated last year
- Rnalytica: An R package of JIRA defect datasets and tool suites for actionable software analytics☆12Aug 12, 2020Updated 5 years ago
- Implementation of mixed language project compilation via Bazel platform.☆17Oct 10, 2020Updated 5 years ago
- ☆14Feb 5, 2024Updated 2 years ago
- Exercises for practicing MLSec for Systems Security☆10Sep 2, 2024Updated last year
- This is the project repository for the paper "Understanding the Automated Parameter Optimization on Transfer Learning for Cross-Project D…☆10Mar 26, 2020Updated 5 years ago
- A simple but elegant LaTeX template for reports for various BDIC modules.☆12Feb 9, 2026Updated last month
- FSE 2023 RAP-Gen: Retrieval-Augmented Patch Generation with CodeT5 for Automatic Program Repair☆14Oct 23, 2024Updated last year
- IST'21 & SANER'22: Semantic-Preserving Program Transformations☆31Oct 25, 2022Updated 3 years ago
- 抓取网易云音乐歌手歌词☆15Jan 18, 2018Updated 8 years ago
- Papers, code and datasets about deep learning for Android malware defenses and malware detection☆148Nov 21, 2023Updated 2 years ago