wssun / BADCODELinks
Backdooring Neural Code Search
☆13Updated last year
Alternatives and similar repositories for BADCODE
Users that are interested in BADCODE are comparing it to the libraries listed below
Sorting:
- ☆14Updated last year
- This is the official code repository for paper "Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code".☆11Updated 2 weeks ago
- Code for the AAAI 2023 paper "CodeAttack: Code-based Adversarial Attacks for Pre-Trained Programming Language Models☆30Updated 2 years ago
- Replication Package for "Natural Attack for Pre-trained Models of Code", ICSE 2022☆46Updated 9 months ago
- ☆15Updated 8 months ago
- A collection of publications that works on code models but beyond focusing on the accuracies.☆13Updated last year
- ☆28Updated 7 months ago
- ☆42Updated 10 months ago
- Official repo for "ProSec: Fortifying Code LLMs with Proactive Security Alignment"☆14Updated 2 months ago
- Simultaneous evaluation on both functionality and security of LLM-generated code.☆17Updated 4 months ago
- [NDSS 2025] "CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models"☆15Updated 5 months ago
- Official implementation of the EMNLP 2021 paper "ONION: A Simple and Effective Defense Against Textual Backdoor Attacks"☆33Updated 3 years ago
- ☆20Updated 6 months ago
- Source Code Search☆11Updated last year
- Enhacing Code Pre-trained Models by Contrastive Learning☆35Updated 2 years ago
- Adversarial Robustness for Code☆15Updated 4 years ago
- ☆19Updated last year
- ☆12Updated 2 years ago
- ☆15Updated 2 years ago
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆29Updated this week
- Source Code for Paper "Large Language Models are Few-Shot Summarizers: Multi-Intent Comment Generation via In-Context Learning"☆16Updated last year
- Generating Adversarial Examples for Holding Robustness of Source Code Processing Models☆14Updated 3 years ago
- Code and data of the ACL-IJCNLP 2021 paper "Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger"☆43Updated 2 years ago
- Towards Robustness of Deep Program Processing Models – Detection, Estimation and Enhancement☆20Updated 2 years ago
- ☆80Updated last year
- This repo illustrates how to evaluate the artifacts in the paper An Extensive Study on Pre-trained Models for Program Understanding and G…☆25Updated 2 years ago
- ☆20Updated last year
- Program Transformation Tool for Java Methods☆11Updated 2 years ago
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- ☆14Updated last year