dessertlab / Targeted-Data-Poisoning-AttacksLinks
This repository contains the code, the dataset and the experimental results related to the paper "Vulnerabilities in AI Code Generators: Exploring Targeted Data Poisoning Attacks" accepted for publication at The 32nd IEEE/ACM International Conference on Program Comprehension (ICPC 2024).
☆10Updated 11 months ago
Alternatives and similar repositories for Targeted-Data-Poisoning-Attacks
Users that are interested in Targeted-Data-Poisoning-Attacks are comparing it to the libraries listed below
Sorting:
- Contract-Based Goal Graph Implementation. Combining LTL synthesis and contract-based design to model and analysis complex systems☆11Updated 2 years ago
- [ICLR 2021] "Generating Adversarial Computer Programs using Optimized Obfuscations" by Shashank Srikant, Sijia Liu, Tamara Mitrovska, Shi…☆30Updated 3 years ago
- ☆57Updated last year
- In-context Example Selection with Influences☆15Updated 2 years ago
- The repository contains the code for analysing the leakage of personally identifiable (PII) information from the output of next word pred…☆97Updated 11 months ago
- Releasing code for "ReCode: Robustness Evaluation of Code Generation Models"☆52Updated last year
- Code and data of the EMNLP 2021 paper "Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer"☆43Updated 2 years ago
- ☆26Updated 4 years ago
- ☆36Updated 2 years ago
- ☆15Updated 7 years ago
- Implementation of the paper "Exploring the Universal Vulnerability of Prompt-based Learning Paradigm" on Findings of NAACL 2022☆29Updated 3 years ago
- MIT IEEE URTC 2023. GSET 2023. Repository for "SeBRUS: Mitigating Data Poisoning in Crowdsourced Datasets with Blockchain". Using Ethere…☆10Updated last year
- This is an official repository for "Performance Scaling via Optimal Transport: Enabling Data Selection from Partially Revealed Sources" (…☆14Updated last year
- Official implementation of "Data Mixture Inference: What do BPE tokenizers reveal about their training data?"☆14Updated 2 months ago
- Coverage-Guided Testing of Long Short-Term Memory (LSTM) Networks☆18Updated 4 years ago
- Official implementation of the EMNLP 2021 paper "ONION: A Simple and Effective Defense Against Textual Backdoor Attacks"☆34Updated 3 years ago
- ☆24Updated last year
- The code and data for "Are Large Pre-Trained Language Models Leaking Your Personal Information?" (Findings of EMNLP '22)☆24Updated 2 years ago
- Code for Findings-ACL 2023 paper: Sentence Embedding Leaks More Information than You Expect: Generative Embedding Inversion Attack to Rec…☆46Updated last year
- ☆18Updated 3 years ago
- Some code for "Stealing Part of a Production Language Model"☆22Updated last year
- Source code and data for ADEPT: A DEbiasing PrompT Framework (AAAI-23).☆15Updated 7 months ago
- ☆20Updated last year
- Social Network Analysis and STEM Education is designed to prepare researchers to apply network analysis in order to better understand and…☆14Updated this week
- Code Snippet Recommendation from Stack Overflow Post☆18Updated 4 years ago
- ☆9Updated 4 years ago
- Universal Robustness Evaluation Toolkit (for Evasion)☆31Updated 2 months ago
- Code for the paper "Be Careful about Poisoned Word Embeddings: Exploring the Vulnerability of the Embedding Layers in NLP Models" (NAACL-…☆41Updated 3 years ago
- A Query Efficient Natural Language Attack in a Black Box Setting☆16Updated 3 years ago
- Code for the paper "BadPrompt: Backdoor Attacks on Continuous Prompts"☆38Updated last year