wssun / BADCODE
Backdooring Neural Code Search
☆13Updated last year
Alternatives and similar repositories for BADCODE:
Users that are interested in BADCODE are comparing it to the libraries listed below
- Replication Package for "Natural Attack for Pre-trained Models of Code", ICSE 2022☆43Updated 6 months ago
- ☆14Updated last year
- Code for the AAAI 2023 paper "CodeAttack: Code-based Adversarial Attacks for Pre-Trained Programming Language Models☆26Updated last year
- ☆13Updated 4 months ago
- ☆17Updated 3 months ago
- Adversarial Robustness for Code☆15Updated 3 years ago
- Enhacing Code Pre-trained Models by Contrastive Learning☆33Updated last year
- Towards Robustness of Deep Program Processing Models – Detection, Estimation and Enhancement☆19Updated 2 years ago
- A collection of publications that works on code models but beyond focusing on the accuracies.☆13Updated last year
- This repository provide the studies on the security of language models for code (CodeLMs).☆44Updated this week
- Official repo for "ProSec: Fortifying Code LLMs with Proactive Security Alignment"☆12Updated 2 months ago
- ☆10Updated last year
- Source Code Search☆11Updated last year
- ☆12Updated 2 years ago
- We propose a novel adversarial example generation technique (i.e., CODA) for testing deep code models. Its key idea is to use code differ…☆14Updated last year
- ☆40Updated 2 years ago
- ☆24Updated 2 years ago
- ☆22Updated 4 months ago
- This repo illustrates how to evaluate the artifacts in the paper An Extensive Study on Pre-trained Models for Program Understanding and G…☆25Updated 2 years ago
- ☆77Updated 10 months ago
- Generating Adversarial Examples for Holding Robustness of Source Code Processing Models☆12Updated 3 years ago
- ☆10Updated 9 months ago
- ☆101Updated 7 months ago
- Program Transformation Tool for Java Methods☆11Updated 2 years ago
- ☆11Updated last year
- Code for the paper: "Adversarial Examples for Models of Code"☆17Updated 4 years ago
- ☆15Updated 2 years ago
- ☆20Updated last year
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆58Updated last year