tianzhaotju / CODALinks
We propose a novel adversarial example generation technique (i.e., CODA) for testing deep code models. Its key idea is to use code differences between the target input and reference inputs to guide the generation of adversarial examples.
☆18Updated 2 years ago
Alternatives and similar repositories for CODA
Users that are interested in CODA are comparing it to the libraries listed below
Sorting:
- ☆32Updated 3 years ago
- VulRepair: A T5-Based Automated Software Vulnerability Repair☆82Updated 6 months ago
- ☆39Updated 2 years ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆62Updated last year
- For our ICSE21 paper "CURE: Code-Aware Neural Machine Translation for Automatic Program Repair" by Nan Jiang, Thibaud Lutellier, and Lin …☆56Updated 2 years ago
- ☆50Updated 3 years ago
- ☆14Updated 3 years ago
- Enhacing Code Pre-trained Models by Contrastive Learning☆36Updated 2 years ago
- Towards Robustness of Deep Program Processing Models – Detection, Estimation and Enhancement☆21Updated 3 years ago
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆73Updated 3 years ago
- mBERT is a mutation testing tool that uses a pre-trained language model (CodeBERT) to generate mutants.☆16Updated 3 months ago
- ☆14Updated last year
- Replication Package for "Natural Attack for Pre-trained Models of Code", ICSE 2022☆49Updated last week
- ☆30Updated 4 years ago
- We propose a novel DL-based mutation technique (LEAM), which adapts the syntax-guided encoder-decoder architecture to build two sub-model…☆29Updated last year
- [SANER 2023] MixCode: Enhancing Code Classification by Mixup-Based Data Augmentation☆15Updated last year
- ☆10Updated last year
- ☆22Updated 4 years ago
- Vision Transformer-Inspired Automated Vulnerability Repair☆19Updated 6 months ago
- [TOSEM 2023] A Survey of Learning-based Automated Program Repair☆72Updated last year
- ☆15Updated 2 years ago
- ☆34Updated last year
- Replication package for "Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection", ICSE 2024.☆67Updated last year
- For our ISSTA23 paper "How Effective are Neural Networks for Fixing Security Vulnerabilities?" by Yi Wu, Nan Jiang, Hung Viet Pham, Thiba…☆40Updated 2 years ago
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆75Updated 3 years ago
- Program Transformation Tool for Java Methods☆11Updated 3 years ago
- An implementation of Tare.☆12Updated last year
- This repo illustrates how to evaluate the artifacts in the paper An Extensive Study on Pre-trained Models for Program Understanding and G…☆25Updated 3 years ago
- This repo illustrates how to evaluate the artifacts in the paper Deep Just-in-Time Defect Prediction: How Far Are We? published in ISSTA'…☆37Updated 2 years ago
- ☆22Updated 5 years ago