NTDXYG / COTTONLinks
Data and code for "Chain-of-Thought in Neural Code Generation: From and For Lightweight Language Models", which accepted in TSE.
☆15Updated last year
Alternatives and similar repositories for COTTON
Users that are interested in COTTON are comparing it to the libraries listed below
Sorting:
- ☆51Updated last year
- Code for the AAAI 2023 paper "CodeAttack: Code-based Adversarial Attacks for Pre-Trained Programming Language Models☆35Updated 2 years ago
- Enhacing Code Pre-trained Models by Contrastive Learning☆38Updated 2 years ago
- Backdooring Neural Code Search☆14Updated 2 years ago
- ☆19Updated last year
- Official repo for "ProSec: Fortifying Code LLMs with Proactive Security Alignment"☆17Updated 10 months ago
- We propose a novel adversarial example generation technique (i.e., CODA) for testing deep code models. Its key idea is to use code differ…☆19Updated 2 years ago
- Dianshu-Liao / AAA-Code-Generation-Framework-for-Code-Repository-Local-Aware-Global-Aware-Third-Party-Aware☆24Updated 2 years ago
- Simultaneous evaluation on both functionality and security of LLM-generated code.☆31Updated 2 months ago
- Replication Package for "Natural Attack for Pre-trained Models of Code", ICSE 2022☆51Updated 3 months ago
- This repo illustrates how to evaluate the artifacts in the paper An Extensive Study on Pre-trained Models for Program Understanding and G…☆27Updated 3 years ago
- Adversarial Attack for Pre-trained Code Models☆10Updated 3 years ago
- ☆11Updated last year
- [LREC-COLING'24] HumanEval-XL: A Multilingual Code Generation Benchmark for Cross-lingual Natural Language Generalization☆41Updated 11 months ago
- An Evolving Code Generation Benchmark Aligned with Real-world Code Repositories☆67Updated last year
- ☆58Updated last year
- [COLING25] CodeJudge Eval: Can Large Language Models be Good Judges in Code Understanding?☆12Updated last year
- ☆21Updated last year
- Dataflow-guided retrieval augmentation for repository-level code completion, ACL 2024 (main)☆33Updated 10 months ago
- ☆20Updated 2 years ago
- Security Attacks on LLM-based Code Completion Tools (AAAI 2025)☆21Updated last month
- Program Transformation Tool for Java Methods☆11Updated 3 years ago
- [ICLR 2021] "Generating Adversarial Computer Programs using Optimized Obfuscations" by Shashank Srikant, Sijia Liu, Tamara Mitrovska, Shi…☆32Updated 4 years ago
- 🔮Reasoning for Safer Code Generation; 🥇Winner Solution of Amazon Nova AI Challenge 2025☆35Updated 5 months ago
- Code for ACL (main) paper "JumpCoder: Go Beyond Autoregressive Coder via Online Modification"☆27Updated last year
- ☆25Updated last year
- ☆16Updated 2 years ago
- Source Code Data Augmentation for Deep Learning: A Survey.☆66Updated last year
- ☆48Updated 3 years ago
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆56Updated 10 months ago