wssun / BADCODELinks
Backdooring Neural Code Search
☆14Updated 2 years ago
Alternatives and similar repositories for BADCODE
Users that are interested in BADCODE are comparing it to the libraries listed below
Sorting:
- Replication Package for "Natural Attack for Pre-trained Models of Code", ICSE 2022☆46Updated last year
- Adversarial Attack for Pre-trained Code Models☆10Updated 3 years ago
- Code for the AAAI 2023 paper "CodeAttack: Code-based Adversarial Attacks for Pre-Trained Programming Language Models☆33Updated 2 years ago
- Adversarial Robustness for Code☆15Updated 4 years ago
- Enhacing Code Pre-trained Models by Contrastive Learning☆35Updated 2 years ago
- ☆15Updated last year
- Towards Robustness of Deep Program Processing Models – Detection, Estimation and Enhancement☆21Updated 2 years ago
- ☆12Updated 2 years ago
- A collection of publications that works on code models but beyond focusing on the accuracies.☆13Updated 2 years ago
- ☆21Updated 10 months ago
- ☆18Updated 11 months ago
- This is the official code repository for paper "Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code".☆13Updated 3 months ago
- ☆39Updated 2 years ago
- ☆25Updated 3 years ago
- ☆121Updated last year
- ☆82Updated 2 weeks ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆76Updated last year
- ☆46Updated 3 years ago
- This repo illustrates how to evaluate the artifacts in the paper An Extensive Study on Pre-trained Models for Program Understanding and G…☆25Updated 3 years ago
- ☆10Updated last year
- ☆12Updated 2 years ago
- Code for the paper: "Adversarial Examples for Models of Code"☆18Updated 4 years ago
- ☆49Updated last year
- ☆23Updated last year
- ☆10Updated 2 years ago
- IST'21 & SANER'22: Semantic-Preserving Program Transformations☆31Updated 2 years ago
- Official repo for "ProSec: Fortifying Code LLMs with Proactive Security Alignment"☆15Updated 5 months ago
- Program Transformation Tool for Java Methods☆11Updated 3 years ago
- ☆16Updated 2 years ago
- Generating Adversarial Examples for Holding Robustness of Source Code Processing Models☆14Updated 3 years ago