tianzhaotju / CODA
We propose a novel adversarial example generation technique (i.e., CODA) for testing deep code models. Its key idea is to use code differences between the target input and reference inputs to guide the generation of adversarial examples.
☆14Updated last year
Alternatives and similar repositories for CODA:
Users that are interested in CODA are comparing it to the libraries listed below
- [SANER 2023] MixCode: Enhancing Code Classification by Mixup-Based Data Augmentation☆14Updated 8 months ago
- ☆41Updated 2 years ago
- Towards Robustness of Deep Program Processing Models – Detection, Estimation and Enhancement☆19Updated 2 years ago
- ☆12Updated 2 years ago
- ☆11Updated 3 years ago
- Replication Package for "Natural Attack for Pre-trained Models of Code", ICSE 2022☆44Updated 6 months ago
- ☆13Updated 3 years ago
- ☆33Updated 2 years ago
- ☆21Updated 4 years ago
- When Less is Enough: Positive-Unlabeled Learning Model for Vulnerability Detection☆12Updated last year
- ☆14Updated last year
- ☆15Updated 3 years ago
- ☆11Updated last year
- ☆10Updated 9 months ago
- ☆31Updated last year
- SeqTrans: Automatic Vulnerability Fix via Sequence to Sequence Learning☆17Updated 3 years ago
- ☆12Updated 2 years ago
- The replication package of paper "Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks"☆22Updated last year
- This repository is the replication package of the ICSE22 paper "FIRA: Fine-Grained Graph-Based Code Change Representation for Automated C…☆31Updated 2 years ago
- For our ICSE21 paper "CURE: Code-Aware Neural Machine Translation for Automatic Program Repair" by Nan Jiang, Thibaud Lutellier, and Lin …☆54Updated 2 years ago
- this is the repository for the paper titled "The Best of Both Worlds: Integrating Semantic Features with Expert Features for Defect Predi…☆18Updated last year
- Neural Program Repair with Execution-based Backpropagation http://arxiv.org/pdf/2105.04123☆23Updated 2 years ago
- ☆29Updated 3 years ago
- ☆15Updated 2 years ago
- We propose a novel DL-based mutation technique (LEAM), which adapts the syntax-guided encoder-decoder architecture to build two sub-model…☆27Updated 8 months ago
- For our ICSE23 paper "KNOD: Domain Knowledge Distilled Tree Decoder for Automated Program Repair" by Nan Jiang, Thibaud Lutellier, Yiling…☆30Updated last year
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆60Updated last year
- ☆24Updated 2 years ago
- ☆11Updated last year
- This repo illustrates how to evaluate the artifacts in the paper Deep Just-in-Time Defect Prediction: How Far Are We? published in ISSTA'…☆37Updated last year