wssun / BADCODELinks
Backdooring Neural Code Search
☆14Updated 2 years ago
Alternatives and similar repositories for BADCODE
Users that are interested in BADCODE are comparing it to the libraries listed below
Sorting:
- Adversarial Attack for Pre-trained Code Models☆10Updated 3 years ago
- Replication Package for "Natural Attack for Pre-trained Models of Code", ICSE 2022☆49Updated last month
- Towards Robustness of Deep Program Processing Models – Detection, Estimation and Enhancement☆21Updated 3 years ago
- Code for the AAAI 2023 paper "CodeAttack: Code-based Adversarial Attacks for Pre-Trained Programming Language Models☆33Updated 2 years ago
- Adversarial Robustness for Code☆16Updated 4 years ago
- ☆21Updated last year
- ☆15Updated 2 years ago
- Enhacing Code Pre-trained Models by Contrastive Learning☆37Updated 2 years ago
- Official repo for "ProSec: Fortifying Code LLMs with Proactive Security Alignment"☆16Updated 8 months ago
- ☆18Updated last year
- This repo illustrates how to evaluate the artifacts in the paper An Extensive Study on Pre-trained Models for Program Understanding and G…☆26Updated 3 years ago
- This is the official code repository for paper "Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code".☆16Updated 2 months ago
- Generating Adversarial Examples for Holding Robustness of Source Code Processing Models☆14Updated 4 years ago
- Program Transformation Tool for Java Methods☆11Updated 3 years ago
- This repository provide the studies on the security of language models for code (CodeLMs).☆51Updated 9 months ago
- ☆12Updated 3 years ago
- A collection of publications that works on code models but beyond focusing on the accuracies.☆13Updated 2 years ago
- ☆10Updated 2 years ago
- ☆26Updated 3 years ago
- Simultaneous evaluation on both functionality and security of LLM-generated code.☆29Updated 3 weeks ago
- ☆11Updated last year
- ☆49Updated last year
- Code for the paper: "Adversarial Examples for Models of Code"☆18Updated 5 years ago
- ☆40Updated 2 years ago
- 🔮Reasoning for Safer Code Generation; 🥇Winner Solution of Amazon Nova AI Challenge 2025☆33Updated 3 months ago
- ☆16Updated 2 years ago
- ☆12Updated 2 years ago
- [ICLR 2021] "Generating Adversarial Computer Programs using Optimized Obfuscations" by Shashank Srikant, Sijia Liu, Tamara Mitrovska, Shi…☆31Updated 4 years ago
- IST'21 & SANER'22: Semantic-Preserving Program Transformations☆31Updated 3 years ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆83Updated 2 years ago