Nero0113 / CoSecLinks
☆11Updated 9 months ago
Alternatives and similar repositories for CoSec
Users that are interested in CoSec are comparing it to the libraries listed below
Sorting:
- Replication Package for "Natural Attack for Pre-trained Models of Code", ICSE 2022☆46Updated 11 months ago
- ☆12Updated 2 years ago
- Simultaneous evaluation on both functionality and security of LLM-generated code.☆21Updated 6 months ago
- Towards Robustness of Deep Program Processing Models – Detection, Estimation and Enhancement☆21Updated 2 years ago
- ☆10Updated last year
- Backdooring Neural Code Search☆13Updated last year
- ☆21Updated 8 months ago
- Enhacing Code Pre-trained Models by Contrastive Learning☆35Updated 2 years ago
- ☆41Updated 2 years ago
- A collection of publications that works on code models but beyond focusing on the accuracies.☆13Updated 2 years ago
- ☆119Updated last year
- [TOSEM 2023] A Survey of Learning-based Automated Program Repair☆71Updated last year
- We propose a novel adversarial example generation technique (i.e., CODA) for testing deep code models. Its key idea is to use code differ…☆14Updated last year
- Adversarial Robustness for Code☆15Updated 4 years ago
- This repo illustrates how to evaluate the artifacts in the paper An Extensive Study on Pre-trained Models for Program Understanding and G…☆25Updated 2 years ago
- [2023 TDSC] Pre-trained Model-based Automated Software Vulnerability Repair: How Far are We?☆26Updated 2 years ago
- VulRepair: A T5-Based Automated Software Vulnerability Repair☆78Updated 2 months ago
- ☆10Updated 2 years ago
- ☆45Updated last year
- ☆15Updated 9 months ago
- Code for the AAAI 2023 paper "CodeAttack: Code-based Adversarial Attacks for Pre-Trained Programming Language Models☆32Updated 2 years ago
- Repository for PrimeVul Vulnerability Detection Dataset☆163Updated 10 months ago
- ☆25Updated 3 years ago
- ☆12Updated 3 years ago
- ☆12Updated last year
- Mutation-based Fault Localization of Deep Neural Networks☆10Updated last year
- ☆46Updated 2 years ago
- This is the official code repository for paper "Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code".☆12Updated last month
- ☆17Updated last month
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆72Updated last year