code-philia / CoEdPilot-extensionLinks
Extension for CoEdPilot
☆21Updated 4 months ago
Alternatives and similar repositories for CoEdPilot-extension
Users that are interested in CoEdPilot-extension are comparing it to the libraries listed below
Sorting:
- Simultaneous evaluation on both functionality and security of LLM-generated code.☆28Updated last week
- ☆21Updated last year
- Repo-Level Code generation papers☆223Updated 4 months ago
- [SCIS 2025] A Survey on Large Language Models for Software Engineering☆295Updated 9 months ago
- ☆130Updated 3 weeks ago
- A Systematic Literature Review on Large Language Models for Automated Program Repair☆216Updated last week
- A Manually-Annotated Code Generation Benchmark Aligned with Real-World Code Repositories☆36Updated last year
- ☆16Updated last year
- Adversarial Attack for Pre-trained Code Models☆10Updated 3 years ago
- Agent Security Bench (ASB)☆147Updated last month
- multi-bit language model watermarking (NAACL 24)☆17Updated last year
- This is the official code repository for paper "Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code".☆15Updated 2 months ago
- enchmarking Large Language Models' Resistance to Malicious Code☆13Updated 11 months ago
- This is the code repository for "Uncovering Safety Risks of Large Language Models through Concept Activation Vector"☆45Updated last month
- Official Repository for The Paper: Safety Alignment Should Be Made More Than Just a Few Tokens Deep☆165Updated 7 months ago
- ☆55Updated last year
- ☆49Updated last year
- Improved techniques for optimization-based jailbreaking on large language models (ICLR2025)☆135Updated 7 months ago
- ☆36Updated last year
- [ICLR 2024] The official implementation of our ICLR2024 paper "AutoDAN: Generating Stealthy Jailbreak Prompts on Aligned Large Language M…☆397Updated 10 months ago
- ☆16Updated 10 months ago
- Toolkit for evaluating the trustworthiness of generative foundation models.☆123Updated 3 months ago
- ☆25Updated last year
- Backdooring Neural Code Search☆14Updated 2 years ago
- ☆22Updated 11 months ago
- ☆15Updated last year
- [USENIX Security 2025] PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models☆218Updated last week
- ☆15Updated last year
- To Think or Not to Think: Exploring the Unthinking Vulnerability in Large Reasoning Models☆32Updated 6 months ago
- The source code of QueryAttack.☆22Updated 9 months ago