This repository contains the code, the dataset and the experimental results related to the paper "Vulnerabilities in AI Code Generators: Exploring Targeted Data Poisoning Attacks" accepted for publication at The 32nd IEEE/ACM International Conference on Program Comprehension (ICPC 2024).
☆13Aug 5, 2024Updated last year
Alternatives and similar repositories for Targeted-Data-Poisoning-Attacks
Users that are interested in Targeted-Data-Poisoning-Attacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A FaceApp like app☆10Mar 31, 2019Updated 6 years ago
- ☆11Nov 28, 2025Updated 3 months ago
- Improving Code Readability Classification using Convolutional Neural Networks☆10Apr 18, 2018Updated 7 years ago
- Repository for code and presentations from the Windows Server 2016 MegaSeries Videos☆11Apr 26, 2021Updated 4 years ago
- ReadMe++: A Multi-domain Multilingual Dataset for Readability Assessment☆12Apr 15, 2025Updated 11 months ago
- Proof of concept code for poisoning code generation models.☆56Dec 6, 2023Updated 2 years ago
- R package for analyzing and manipulating multilabel datasets☆24Dec 10, 2019Updated 6 years ago
- JEMMA: An Extensible Java dataset for Many ML4Code Applications☆19Dec 12, 2022Updated 3 years ago
- mReasoner is a unified computational implementation of the model theory of thinking and reasoning☆13Aug 17, 2023Updated 2 years ago
- ☆14Feb 26, 2025Updated last year
- ESEC/FSE'21: Prediction-Preserving Program Simplification☆10Oct 4, 2022Updated 3 years ago
- Adversarial Attack for Pre-trained Code Models☆10Jul 19, 2022Updated 3 years ago
- The replication package of paper "Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks"☆28Jan 3, 2024Updated 2 years ago
- Code associated with ICML (2024). "Defense against Backdoor Attack on Pre-trained Language Models via Head Pruning and Attention Normaliz…☆10Feb 22, 2026Updated last month
- learning to protect communications with adversarial neural cryptography☆20Aug 15, 2018Updated 7 years ago
- VERA-MH official repository☆32Updated this week
- Exploring aspects of similarity between spoken personal narratives by disentangling them into narrative clause types -- Supplementary inf…☆12Jul 14, 2020Updated 5 years ago
- ☆17Jul 23, 2025Updated 8 months ago
- Dataset and pre-trained model of EMNLP-IJCNLP 2019 paper "TalkDown: A Corpus for Condescension Detection in Context."☆10Jan 26, 2020Updated 6 years ago
- Data and code for "Chain-of-Thought in Neural Code Generation: From and For Lightweight Language Models", which accepted in TSE.☆15Jul 3, 2024Updated last year
- All source codes used in "얀데레 아가씨"☆11Aug 6, 2017Updated 8 years ago
- The dataset, source code and the results of our ESEC/FSE 2023 paper "An Extensive Study on Adversarial Attack against Pre-trained Models …☆15Feb 19, 2024Updated 2 years ago
- ☆22Dec 17, 2025Updated 3 months ago
- [ICLR 2025] REFINE: Inversion-Free Backdoor Defense via Model Reprogramming☆13Feb 13, 2025Updated last year
- ☆14Dec 12, 2023Updated 2 years ago
- ☆14Jul 27, 2020Updated 5 years ago
- A collection of small corpuses of interesting data for the creation of bots and similar stuff.☆10Sep 26, 2018Updated 7 years ago
- Backdooring Neural Code Search☆14Sep 8, 2023Updated 2 years ago
- Codebase describing experiments in Truncation Sampling as Language Model Desmoothing☆13Dec 6, 2022Updated 3 years ago
- ☆46Jun 21, 2022Updated 3 years ago
- ☆11Apr 9, 2024Updated last year
- Code and data for "A fine-grained comparison of pragmatic language understanding in humans and language models"☆11Dec 14, 2022Updated 3 years ago
- [ACL 2024] Official Repository for "Leveraging Large Language Models for Learning Complex Legal Concepts through Storytelling"☆16Aug 19, 2024Updated last year
- Stock prediction done using RNN and LTSM to resolve vanishing gradient problem. Dataset used is obtained from Pakistan Stock Exchange☆10Dec 6, 2018Updated 7 years ago
- Security Attacks on LLM-based Code Completion Tools (AAAI 2025)☆21Dec 31, 2025Updated 2 months ago
- code and data associated with CoMPosT: Characterizing and Evaluating Caricature in LLM Simulations☆11Oct 13, 2023Updated 2 years ago
- ☆18Aug 15, 2022Updated 3 years ago
- Implementation of model described in 'Learning to Protect Communications with Adversarial Neural Cryptography' (Martín Abadi & David G. A…☆47Nov 6, 2016Updated 9 years ago
- ☆12Mar 12, 2022Updated 4 years ago