Backdooring Neural Code Search
☆14Sep 8, 2023Updated 2 years ago
Alternatives and similar repositories for BADCODE
Users that are interested in BADCODE are comparing it to the libraries listed below
Sorting:
- ☆14Dec 12, 2023Updated 2 years ago
- Code for the AAAI 2023 paper "CodeAttack: Code-based Adversarial Attacks for Pre-Trained Programming Language Models☆35Apr 18, 2023Updated 2 years ago
- Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"☆28Sep 11, 2024Updated last year
- Adversarial Attack for Pre-trained Code Models☆10Jul 19, 2022Updated 3 years ago
- ☆16Sep 4, 2024Updated last year
- ☆15Dec 29, 2023Updated 2 years ago
- This repository is the official implementation of the paper "ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning…☆19Jun 7, 2023Updated 2 years ago
- Official repo for "ProSec: Fortifying Code LLMs with Proactive Security Alignment"☆17Feb 26, 2026Updated 3 weeks ago
- [IEEE S&P'24] ODSCAN: Backdoor Scanning for Object Detection Models☆21Oct 5, 2025Updated 5 months ago
- ☆20Feb 11, 2024Updated 2 years ago
- Data and code for "Chain-of-Thought in Neural Code Generation: From and For Lightweight Language Models", which accepted in TSE.☆15Jul 3, 2024Updated last year
- ☆18Aug 15, 2022Updated 3 years ago
- Official Implementation of NeurIPS 2024 paper - BiScope: AI-generated Text Detection by Checking Memorization of Preceding Tokens☆28Feb 17, 2026Updated last month
- The official codes for our paper at COLING 2022: Semantic-Preserving Adversarial Code Comprehension☆12Oct 23, 2022Updated 3 years ago
- ☆18Mar 10, 2026Updated last week
- ☆19Mar 9, 2024Updated 2 years ago
- Code for the paper "RAP: Robustness-Aware Perturbations for Defending against Backdoor Attacks on NLP Models" (EMNLP 2021)☆25Oct 21, 2021Updated 4 years ago
- ☆26Dec 1, 2022Updated 3 years ago
- [EMNLP 24] Official Implementation of CLEANGEN: Mitigating Backdoor Attacks for Generation Tasks in Large Language Models☆19Mar 9, 2025Updated last year
- [Oakland 2024] Exploring the Orthogonality and Linearity of Backdoor Attacks☆28Apr 15, 2025Updated 11 months ago
- [NDSS 2025] "CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models"☆25Aug 20, 2025Updated 7 months ago
- Replication Package for "Natural Attack for Pre-trained Models of Code", ICSE 2022☆52Nov 7, 2025Updated 4 months ago
- This repository provide the studies on the security of language models for code (CodeLMs).☆51Feb 26, 2025Updated last year
- ☆11Mar 24, 2023Updated 2 years ago
- Implementing SDN based VANET simulated on Mininet-Wifi nodes - Socket programming to implement functionality as an application☆10Feb 22, 2019Updated 7 years ago
- This repo is the benchmark for source code summarization on C language☆26Mar 18, 2021Updated 5 years ago
- ☆12Dec 22, 2025Updated 3 months ago
- Mostly recording papers about models' trustworthy applications. Intending to include topics like model evaluation & analysis, security, c…☆21May 30, 2023Updated 2 years ago
- A block pruning framework for LLMs.☆28May 17, 2025Updated 10 months ago
- ☆13May 28, 2023Updated 2 years ago
- Official PyTorch implementation of our paper "Adversarial Training of Self-supervised Monocular Depth Estimation against Physical-World A…☆11Feb 8, 2023Updated 3 years ago
- Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing☆14Feb 18, 2021Updated 5 years ago
- Proof of concept code for poisoning code generation models.☆56Dec 6, 2023Updated 2 years ago
- [ACL 2025] Adaptive Retrieval without Self-Knowledge? Bringing Uncertainty Back Home☆17May 17, 2025Updated 10 months ago
- List of Papers on Attack and Defense (AD) in AI Models☆27Mar 18, 2022Updated 4 years ago
- ☆13May 1, 2024Updated last year
- Source Code Search☆11Nov 16, 2023Updated 2 years ago
- ☆14Feb 26, 2025Updated last year
- Reconstructive Neuron Pruning for Backdoor Defense (ICML 2023)☆39Dec 24, 2023Updated 2 years ago