YBRua / SrcMarker
Code for paper "SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations" (IEEE S&P 2024)
☆21Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for SrcMarker
- ☆14Updated last year
- Machine Learning & Security Seminar @Purdue University☆25Updated last year
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense☆14Updated 6 months ago
- ☆18Updated 8 months ago
- Repository for Towards Codable Watermarking for Large Language Models☆29Updated last year
- ☆62Updated 4 years ago
- ☆14Updated last month
- Code release for RobOT (ICSE'21)☆15Updated last year
- ☆73Updated 7 months ago
- [S&P'24] Test-Time Poisoning Attacks Against Test-Time Adaptation Models☆16Updated 9 months ago
- ☆17Updated 3 years ago
- [USENIX Security'24] Official repository of "Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise a…☆56Updated last month
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆25Updated 3 weeks ago
- ☆23Updated last month
- CodexLeaks: Privacy Leaks from Code Generation Language Models in GitHub Copilot☆11Updated last year
- Code release for DeepJudge (S&P'22)☆51Updated last year
- Adversarial Robustness for Code☆16Updated 3 years ago
- AdvDoor: Adversarial Backdoor Attack of Deep Learning System☆30Updated 2 weeks ago
- This is the source code for MEA-Defender. Our paper is accepted by the IEEE Symposium on Security and Privacy (S&P) 2024.☆15Updated last year
- Seminar 2022☆21Updated 3 weeks ago
- This repository is the official implementation of the paper "ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning…☆17Updated last year
- Backdooring Neural Code Search☆12Updated last year
- ☆76Updated 3 years ago
- Code for the AAAI 2023 paper "CodeAttack: Code-based Adversarial Attacks for Pre-Trained Programming Language Models☆25Updated last year
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆55Updated last year
- Distribution Preserving Backdoor Attack in Self-supervised Learning☆11Updated 9 months ago
- ☆16Updated 2 years ago
- Academic Papers about LLM Application on Security☆109Updated 5 months ago
- ☆13Updated 2 years ago