NTDXYG / COTTONLinks
Data and code for "Chain-of-Thought in Neural Code Generation: From and For Lightweight Language Models", which accepted in TSE.
☆15Updated 11 months ago
Alternatives and similar repositories for COTTON
Users that are interested in COTTON are comparing it to the libraries listed below
Sorting:
- ☆43Updated 11 months ago
- Backdooring Neural Code Search☆13Updated last year
- Code for the AAAI 2023 paper "CodeAttack: Code-based Adversarial Attacks for Pre-Trained Programming Language Models☆31Updated 2 years ago
- Enhacing Code Pre-trained Models by Contrastive Learning☆35Updated 2 years ago
- Simultaneous evaluation on both functionality and security of LLM-generated code.☆20Updated 5 months ago
- Replication Package for "Natural Attack for Pre-trained Models of Code", ICSE 2022☆46Updated 10 months ago
- ☆15Updated 8 months ago
- ☆12Updated 2 years ago
- ☆20Updated 7 months ago
- ☆12Updated 8 months ago
- ☆10Updated 2 years ago
- ☆20Updated 2 years ago
- Towards Robustness of Deep Program Processing Models – Detection, Estimation and Enhancement☆21Updated 2 years ago
- ☆12Updated last year
- Source Code for Paper "Large Language Models are Few-Shot Summarizers: Multi-Intent Comment Generation via In-Context Learning"☆16Updated 2 years ago
- ☆12Updated 10 months ago
- This repo illustrates how to evaluate the artifacts in the paper An Extensive Study on Pre-trained Models for Program Understanding and G…☆25Updated 2 years ago
- This is the official code repository for paper "Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code".☆11Updated last month
- ☆23Updated 8 months ago
- ☆15Updated 2 years ago
- ☆10Updated last year
- A collection of publications that works on code models but beyond focusing on the accuracies.☆13Updated last year
- ☆46Updated 2 years ago
- Program Transformation Tool for Java Methods☆11Updated 2 years ago
- CodeGuard+: Constrained Decoding for Secure Code Generation☆11Updated 10 months ago
- ☆116Updated 11 months ago
- ☆41Updated 2 years ago
- ☆33Updated 2 years ago
- Official implementation of our ICSE 2023 paper on Automatic Code Generation.☆27Updated last year
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆72Updated last year