Extension for CoEdPilot
☆21Feb 25, 2026Updated 3 weeks ago
Alternatives and similar repositories for CoEdPilot-extension
Users that are interested in CoEdPilot-extension are comparing it to the libraries listed below
Sorting:
- Source code for "CoEdPilot: Recommending Code Edits with Learned Prior Edit Relevance, Project-wise Awareness, and Interactive Nature"☆102Apr 3, 2025Updated 11 months ago
- PhishDecloaker: Detecting CAPTCHA-cloaked Phishing Websites via Hybrid Vision-based Interactive Models☆14Jan 3, 2025Updated last year
- A feedback-based debugger for interactively recommending suspicious step in buggy program execution.☆56Mar 11, 2024Updated 2 years ago
- ☆14May 7, 2024Updated last year
- A Mining Approach towards Automating Regression Dataset Construction from Code Evolution History☆34Dec 29, 2024Updated last year
- Code for the paper "Watermarking Makes Language Models Radioactive"☆21Oct 25, 2024Updated last year
- Benchmarks for the VNN Comp 2023☆16Jun 7, 2024Updated last year
- NLQF is a tool to filter query-appropriate comments for building high-quality code search datasets.☆19Feb 15, 2022Updated 4 years ago
- For Certified Robustness to Text Adversarial Attacks by Randomized [MASK]☆17Oct 8, 2024Updated last year
- ☆26Apr 18, 2025Updated 11 months ago
- Keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on popular da…☆19Jun 12, 2024Updated last year
- Analyze execution trace to find regression bug☆41Jun 2, 2024Updated last year
- ☆15Jul 20, 2025Updated 8 months ago
- An isolated environment for DNS cache poisoning attack investigation and demonstration.☆10Nov 22, 2020Updated 5 years ago
- ☆38Oct 28, 2025Updated 4 months ago
- ☆31Sep 22, 2024Updated last year
- Some simple codes to format the CSDMC2010 SPAM corpus☆11Sep 18, 2016Updated 9 years ago
- SAFER: A Structure-free Approach For cErtified Robustness to Adversarial Word Substitutions (ACL 2020)☆31Jan 27, 2021Updated 5 years ago
- Codebase for VidHal: Benchmarking Hallucinations in Vision LLMs☆14Apr 19, 2025Updated 11 months ago
- Implementation and datasets for "Training Language Models to Generate Quality Code with Program Analysis Feedback"☆43Jul 21, 2025Updated 8 months ago
- ☆12Nov 2, 2025Updated 4 months ago
- Official repository of the paper: Who Wrote this Code? Watermarking for Code Generation (ACL 2024)☆40May 28, 2024Updated last year
- ☆13Sep 21, 2019Updated 6 years ago
- List of subdomain and dynamic DNS providers☆10Dec 11, 2025Updated 3 months ago
- ☆21Jul 9, 2025Updated 8 months ago
- [Blog 1] Recording a bug of grpo_trainer in some R1 projects☆22Feb 23, 2025Updated last year
- Fault localization and automated program repair techniques☆34Aug 26, 2025Updated 6 months ago
- ☆19Dec 20, 2024Updated last year
- Project work done as part of Udacity's Data Analyst Nanodegree course.☆14Oct 15, 2019Updated 6 years ago
- reproduction of Thermometer Encoding: One Hot Way To Resist Adversarial Examples in pytorch☆16Dec 4, 2017Updated 8 years ago
- RapidIn: Scalable Influence Estimation for Large Language Models (LLMs). The implementation for paper "Token-wise Influential Training Da…☆21Mar 10, 2026Updated last week
- The MiniAgents visualization tool for simulacra.☆17Apr 18, 2024Updated last year
- A Clone-Based Approach for Recommending Modification on Pasted Code☆12Jun 10, 2017Updated 8 years ago
- ☆27Jul 20, 2024Updated last year
- [USENIX Security 2024] Official Repository of 'KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-…☆16Aug 6, 2025Updated 7 months ago
- Official Implementation of "Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages" USENIX'21☆346Jul 26, 2025Updated 7 months ago
- Python asyncio-based library that implements the SPAMC/SPAMD client protocol used by SpamAssassin.☆17Updated this week
- Dynaphish: A complementary module for any reference-based phishing detector with BrandKnowledgeExpansion and WebInteraction☆19Sep 11, 2025Updated 6 months ago
- An Android application that detects phishing in incoming texts and alerts the user through notification in real time. The user may also e…☆19Feb 17, 2024Updated 2 years ago