Replication Package for "Natural Attack for Pre-trained Models of Code", ICSE 2022
☆51Nov 7, 2025Updated 5 months ago
Alternatives and similar repositories for attack-pretrain-models-of-code
Users that are interested in attack-pretrain-models-of-code are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Towards Robustness of Deep Program Processing Models – Detection, Estimation and Enhancement☆21Oct 29, 2022Updated 3 years ago
- Code for the AAAI 2023 paper "CodeAttack: Code-based Adversarial Attacks for Pre-Trained Programming Language Models☆34Apr 18, 2023Updated 2 years ago
- Generating Adversarial Examples for Holding Robustness of Source Code Processing Models☆15Dec 2, 2021Updated 4 years ago
- IST'21 & SANER'22: Semantic-Preserving Program Transformations☆31Oct 25, 2022Updated 3 years ago
- Program Transformation Tool for Java Methods☆11Sep 16, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- We propose a novel adversarial example generation technique (i.e., CODA) for testing deep code models. Its key idea is to use code differ…☆19Oct 8, 2023Updated 2 years ago
- Enhacing Code Pre-trained Models by Contrastive Learning☆39Mar 8, 2023Updated 3 years ago
- ☆14Mar 3, 2022Updated 4 years ago
- Releasing code for "ReCode: Robustness Evaluation of Code Generation Models"☆58Mar 20, 2024Updated 2 years ago
- Adversarial Robustness for Code☆16Mar 30, 2021Updated 5 years ago
- ☆18Mar 10, 2026Updated last month
- ☆20Mar 6, 2023Updated 3 years ago
- The official codes for our paper at COLING 2022: Semantic-Preserving Adversarial Code Comprehension☆12Oct 23, 2022Updated 3 years ago
- A collection of publications that works on code models but beyond focusing on the accuracies.☆13Jun 30, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆10Apr 15, 2023Updated 3 years ago
- ☆41Jan 13, 2023Updated 3 years ago
- Adversarial Attack for Pre-trained Code Models☆10Jul 19, 2022Updated 3 years ago
- This is the official code repository for paper "Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code".☆17Sep 21, 2025Updated 6 months ago
- ☆16Aug 16, 2023Updated 2 years ago
- Data and code for "Chain-of-Thought in Neural Code Generation: From and For Lightweight Language Models", which accepted in TSE.☆15Jul 3, 2024Updated last year
- ☆128Jul 14, 2024Updated last year
- This repo illustrates how to evaluate the artifacts in the paper An Extensive Study on Pre-trained Models for Program Understanding and G…☆27Aug 12, 2022Updated 3 years ago
- Backdooring Neural Code Search☆14Sep 8, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This is the project repository of our ASE22 paper: Natural Test Generation for Precise Testing of Question Answering Software☆14Dec 1, 2022Updated 3 years ago
- ☆25Apr 25, 2024Updated last year
- [ICLR 2021] "Generating Adversarial Computer Programs using Optimized Obfuscations" by Shashank Srikant, Sijia Liu, Tamara Mitrovska, Shi…☆32Nov 15, 2021Updated 4 years ago
- INDICT: Code Generation with Internal Dialogues of Critiques for Both Security and Helpfulness☆14Nov 10, 2025Updated 5 months ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38May 10, 2018Updated 7 years ago
- ML models often mispredict, and it is hard to tell when and why. We present a data mining based approach to discover whether there is a c…☆17Jun 6, 2022Updated 3 years ago
- Code release for RobOT (ICSE'21)☆15Dec 5, 2022Updated 3 years ago
- ☆56Nov 19, 2022Updated 3 years ago
- The dataset, source code and the results of our ESEC/FSE 2023 paper "An Extensive Study on Adversarial Attack against Pre-trained Models …☆15Feb 19, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Replication package for "Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection", ICSE 2024.☆75Sep 24, 2024Updated last year
- ☆22Nov 17, 2021Updated 4 years ago
- ☆53Jul 16, 2024Updated last year
- This repository provide the studies on the security of language models for code (CodeLMs).☆50Feb 26, 2025Updated last year
- [ICSE 2023] Differentiable interpretation and failure-inducing input generation for neural network numerical bugs.