yangzhou6666 / adversarial-backdoor-for-code-modelsView external linksLinks
☆18Sep 28, 2024Updated last year
Alternatives and similar repositories for adversarial-backdoor-for-code-models
Users that are interested in adversarial-backdoor-for-code-models are comparing it to the libraries listed below
Sorting:
- The dataset, source code and the results of our ESEC/FSE 2023 paper "An Extensive Study on Adversarial Attack against Pre-trained Models …☆15Feb 19, 2024Updated last year
- Replication Package for "Natural Attack for Pre-trained Models of Code", ICSE 2022☆51Nov 7, 2025Updated 3 months ago
- Backdooring Neural Code Search☆14Sep 8, 2023Updated 2 years ago
- ☆15Dec 12, 2023Updated 2 years ago
- Code for the AAAI 2023 paper "CodeAttack: Code-based Adversarial Attacks for Pre-Trained Programming Language Models☆35Apr 18, 2023Updated 2 years ago
- Towards Robustness of Deep Program Processing Models – Detection, Estimation and Enhancement☆22Oct 29, 2022Updated 3 years ago
- Code and Data for: Reading Between the Lines: Modeling User Behavior and Costs in AI-Assisted Programming☆33Feb 23, 2024Updated last year
- Python code to automatically produce a summary of a piece of text.☆12Sep 8, 2016Updated 9 years ago
- [ICLR 2021] "Generating Adversarial Computer Programs using Optimized Obfuscations" by Shashank Srikant, Sijia Liu, Tamara Mitrovska, Shi…☆32Nov 15, 2021Updated 4 years ago
- Enhacing Code Pre-trained Models by Contrastive Learning☆38Mar 8, 2023Updated 2 years ago
- Crater Backend is the web backend of Crater System.☆22Nov 2, 2025Updated 3 months ago
- ☆13Oct 11, 2024Updated last year
- ☆12Aug 15, 2023Updated 2 years ago
- Threat hunting in social media☆12Feb 17, 2019Updated 6 years ago
- A labeled dataset for domain specific named entity recognition☆13Mar 1, 2022Updated 3 years ago
- This repository contains code and data for reproducing the experiments of three papers that focus on two subtasks of table annotation: co…☆12Mar 5, 2025Updated 11 months ago
- ☆14Feb 26, 2025Updated 11 months ago
- ☆11Feb 2, 2026Updated last week
- ☆10Oct 20, 2022Updated 3 years ago
- Repository for UC Santa Cruz's work on Libresoft's CVSAnalY☆15May 13, 2013Updated 12 years ago
- ESEC/FSE'21: Prediction-Preserving Program Simplification☆10Oct 4, 2022Updated 3 years ago
- Implementation for iris biometric template protection based on NTRU homomorphic encryption.☆11Dec 20, 2021Updated 4 years ago
- Code associated with ICML (2024). "Defense against Backdoor Attack on Pre-trained Language Models via Head Pruning and Attention Normaliz…☆10Nov 26, 2024Updated last year
- The official codes for our paper at COLING 2022: Semantic-Preserving Adversarial Code Comprehension☆12Oct 23, 2022Updated 3 years ago
- Code of "Instruction Multi-Constraint Molecular Generation Using a Teacher-Student Large Language Model"☆14Jul 8, 2025Updated 7 months ago
- The TextWorld KG Dataset from the paper Building Dynamic Knowledge Graphs from Text-based Games☆10Mar 11, 2020Updated 5 years ago
- Dataset for Paper "Exploring Content Selection in Summarization of Novel Chapters"☆14Mar 20, 2023Updated 2 years ago
- Hierarchical Story Generation based on (https://arxiv.org/abs/1805.04833)☆13May 6, 2020Updated 5 years ago
- Adversarial Attack for Pre-trained Code Models☆10Jul 19, 2022Updated 3 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- Codebase for the paper "Schema-guided User Satisfaction Modeling for Task-oriented Dialogues"☆11Aug 6, 2025Updated 6 months ago
- Earth observations, especially satellite data, have produced a wealth of methods and results in meeting global challenges, often presente…☆12Sep 22, 2022Updated 3 years ago
- Proof of concept code for poisoning code generation models.☆55Dec 6, 2023Updated 2 years ago
- ☆10Sep 6, 2024Updated last year
- ☆22Sep 5, 2025Updated 5 months ago
- Named entity recognition system using multi-stage CRF and statistical rules☆12Oct 3, 2016Updated 9 years ago
- Focusing on potential named entities during active label acquisition.☆10Oct 8, 2024Updated last year
- [ACL 2023] To Copy Rather Than Memorize: A Vertical Learning Paradigm for Knowledge Graph Completion☆13Feb 3, 2023Updated 3 years ago
- [ICLR 2025] REFINE: Inversion-Free Backdoor Defense via Model Reprogramming☆12Feb 13, 2025Updated last year