☆18Mar 10, 2026Updated 2 weeks ago
Alternatives and similar repositories for adversarial-backdoor-for-code-models
Users that are interested in adversarial-backdoor-for-code-models are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of publications that works on code models but beyond focusing on the accuracies.☆13Jun 30, 2023Updated 2 years ago
- The dataset, source code and the results of our ESEC/FSE 2023 paper "An Extensive Study on Adversarial Attack against Pre-trained Models …☆15Feb 19, 2024Updated 2 years ago
- Replication Package for "Natural Attack for Pre-trained Models of Code", ICSE 2022☆52Nov 7, 2025Updated 4 months ago
- ☆14Dec 12, 2023Updated 2 years ago
- Backdooring Neural Code Search☆14Sep 8, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Code for the AAAI 2023 paper "CodeAttack: Code-based Adversarial Attacks for Pre-Trained Programming Language Models☆34Apr 18, 2023Updated 2 years ago
- Towards Robustness of Deep Program Processing Models – Detection, Estimation and Enhancement☆21Oct 29, 2022Updated 3 years ago
- Code and Data for: Reading Between the Lines: Modeling User Behavior and Costs in AI-Assisted Programming☆33Feb 23, 2024Updated 2 years ago
- Checks the PDFs submitted to a conference, e.g., for formatting violations and double anonymous violations☆66Dec 11, 2021Updated 4 years ago
- Enhacing Code Pre-trained Models by Contrastive Learning☆38Mar 8, 2023Updated 3 years ago
- A First Look at Conventional Commits Classification☆13Nov 18, 2024Updated last year
- The official codes for our paper at COLING 2022: Semantic-Preserving Adversarial Code Comprehension☆12Oct 23, 2022Updated 3 years ago
- [ICLR 2021] "Generating Adversarial Computer Programs using Optimized Obfuscations" by Shashank Srikant, Sijia Liu, Tamara Mitrovska, Shi…☆32Nov 15, 2021Updated 4 years ago
- VectorDefense: Vectorization as a Defense to Adversarial Examples --->☆13May 3, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Proof of concept code for poisoning code generation models.☆56Dec 6, 2023Updated 2 years ago
- This repository is for the paper of ICSE 2023: Regression Fuzzing for Deep Learning Systems☆12Feb 21, 2024Updated 2 years ago
- Reimplentation of paper using gzip + knn for text classification☆18Aug 1, 2023Updated 2 years ago
- Adversarial Attack for Pre-trained Code Models☆10Jul 19, 2022Updated 3 years ago
- Implementation for iris biometric template protection based on NTRU homomorphic encryption.☆12Dec 20, 2021Updated 4 years ago
- ☆128Jul 14, 2024Updated last year
- Python code to automatically produce a summary of a piece of text.☆12Sep 8, 2016Updated 9 years ago
- open source code for NeurIPS 2024 paper☆12Nov 9, 2025Updated 4 months ago
- ☆13Oct 11, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆22Sep 5, 2025Updated 6 months ago
- ☆10Nov 22, 2022Updated 3 years ago
- All code and data necessary to replicate experiments in the paper BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Model…☆13Sep 16, 2024Updated last year
- Codes of PostEdit☆23Apr 28, 2025Updated 10 months ago
- Single Image Backdoor Inversion via Robust Smoothed Classifiers☆17Jul 18, 2023Updated 2 years ago
- Code associated with ICML (2024). "Defense against Backdoor Attack on Pre-trained Language Models via Head Pruning and Attention Normaliz…☆10Feb 22, 2026Updated last month
- ☆16Apr 10, 2024Updated last year
- My implement of InstantBooth☆13Sep 11, 2023Updated 2 years ago
- Program Transformation Tool for Java Methods☆11Sep 16, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Repo for our Paper: Cross Quality LFW: A database for Analyzing Cross-Resolution Image Face Recognition in Unconstrained Environments☆19Nov 25, 2022Updated 3 years ago
- Invariant Feature Regularization for Fair Face Recognition (ICCV'23)☆15Oct 23, 2023Updated 2 years ago
- ☆10Feb 9, 2019Updated 7 years ago
- The code for ACM MM2024 (Multimodal Unlearnable Examples: Protecting Data against Multimodal Contrastive Learning)☆15Jul 18, 2024Updated last year
- The replication package of "CCRep: Learning Code Change Representations via Pre-Trained Code Model and Query Back""☆13Feb 8, 2023Updated 3 years ago
- Releasing code for "ReCode: Robustness Evaluation of Code Generation Models"☆58Mar 20, 2024Updated 2 years ago
- Code release for RobOT (ICSE'21)☆15Dec 5, 2022Updated 3 years ago