selfdefend / CodeLinks
β24Updated 6 months ago
Alternatives and similar repositories for Code
Users that are interested in Code are comparing it to the libraries listed below
Sorting:
- π₯π₯π₯ Detecting hidden backdoors in Large Language Models with only black-box accessβ35Updated 2 months ago
- β16Updated 11 months ago
- β82Updated last year
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agaiβ¦β48Updated 4 months ago
- β35Updated 10 months ago
- [NDSS 2025] "CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models"β16Updated 7 months ago
- official implementation of [USENIX Sec'25] StruQ: Defending Against Prompt Injection with Structured Queriesβ44Updated 2 weeks ago
- β60Updated 7 months ago
- The official repository for guided jailbreak benchmarkβ11Updated last week
- Seminar 2022β21Updated 3 weeks ago
- β120Updated last year
- The official repository of the paper "The Digital Cybersecurity Expert: How Far Have We Come?" presented in IEEE S&P 2025β19Updated 2 months ago
- Official repo for "ProSec: Fortifying Code LLMs with Proactive Security Alignment"β15Updated 4 months ago
- Safety at Scale: A Comprehensive Survey of Large Model Safetyβ183Updated 5 months ago
- β15Updated last year
- Agent Security Bench (ASB)β100Updated last month
- Official repo for FSE'24 paper "CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking"β16Updated 4 months ago
- [USENIX Security'24] Official repository of "Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise aβ¦β101Updated 9 months ago
- Code for paper "SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations" (IEEE S&P 2024)β29Updated last year
- β14Updated last year
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defenseβ17Updated last year
- β20Updated 5 months ago
- Machine Learning & Security Seminar @Purdue Universityβ25Updated 2 years ago
- [USENIX Security 2025] PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Modelsβ176Updated 5 months ago
- β18Updated 2 years ago
- β22Updated last year
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publisβ¦β74Updated last year
- This is the official code repository for paper "Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code".β12Updated 2 months ago
- β25Updated 11 months ago
- [USENIX'24] Prompt Stealing Attacks Against Text-to-Image Generation Modelsβ41Updated 6 months ago