purdue-hcss / SecureChainLinks
☆46Updated 2 months ago
Alternatives and similar repositories for SecureChain
Users that are interested in SecureChain are comparing it to the libraries listed below
Sorting:
- Official Implementation of NeurIPS 2024 paper - BiScope: AI-generated Text Detection by Checking Memorization of Preceding Tokens☆26Updated 8 months ago
- ☆20Updated last year
- 🔮Reasoning for Safer Code Generation; 🥇Winner Solution of Amazon Nova AI Challenge 2025☆31Updated 2 months ago
- ☆15Updated last year
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- Backdooring Neural Code Search☆14Updated 2 years ago
- Official repo for "ProSec: Fortifying Code LLMs with Proactive Security Alignment"☆15Updated 7 months ago
- ☆124Updated last year
- ☆21Updated last year
- ☆48Updated last year
- Replication Package for "Natural Attack for Pre-trained Models of Code", ICSE 2022☆49Updated last week
- ☆36Updated last year
- Adversarial Attack for Pre-trained Code Models☆10Updated 3 years ago
- This is the official code repository for paper "Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code".☆15Updated last month
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆45Updated 5 months ago
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense☆17Updated last year
- ☆27Updated 10 months ago
- Siren: Byzantine-robust Federated Learning via Proactive Alarming (SoCC '21)☆11Updated last year
- Adversarial Robustness for Code☆16Updated 4 years ago
- Simultaneous evaluation on both functionality and security of LLM-generated code.☆27Updated 2 months ago
- White-box Fairness Testing through Adversarial Sampling☆13Updated 4 years ago
- A toolbox for backdoor attacks.☆22Updated 2 years ago
- enchmarking Large Language Models' Resistance to Malicious Code☆13Updated 11 months ago
- Distribution Preserving Backdoor Attack in Self-supervised Learning☆20Updated last year
- [USENIX Security 2025] PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models☆215Updated 8 months ago
- Code for paper "SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations" (IEEE S&P 2024)☆30Updated last year
- ☆16Updated 2 years ago
- ☆18Updated last year
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆80Updated 2 years ago
- ☆15Updated last year