yyl-github-1896 / CodeTAELinks
This is the official code repository for paper "Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code".
☆13Updated 2 weeks ago
Alternatives and similar repositories for CodeTAE
Users that are interested in CodeTAE are comparing it to the libraries listed below
Sorting:
- ☆15Updated last year
- SampDetox: Black-box Backdoor Defense via Perturbation-based Sample Detoxification☆12Updated 4 months ago
- Backdooring Neural Code Search☆14Updated 2 years ago
- [NDSS 2025] "CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models"☆19Updated last month
- ☆35Updated 11 months ago
- ☆18Updated last year
- Official Implementation of NeurIPS 2024 paper - BiScope: AI-generated Text Detection by Checking Memorization of Preceding Tokens☆24Updated 6 months ago
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆44Updated 4 months ago
- Code release for RobOT (ICSE'21)☆15Updated 2 years ago
- ☆18Updated 3 years ago
- ☆27Updated last year
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense☆17Updated last year
- [IEEE S&P'24] ODSCAN: Backdoor Scanning for Object Detection Models☆16Updated this week
- ☆36Updated last year
- ☆82Updated last month
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- A toolbox for backdoor attacks.☆22Updated 2 years ago
- ☆18Updated 3 years ago
- Distribution Preserving Backdoor Attack in Self-supervised Learning☆17Updated last year
- Replication Package for "Natural Attack for Pre-trained Models of Code", ICSE 2022☆47Updated last year
- ☆16Updated last year
- Code for paper "SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations" (IEEE S&P 2024)☆30Updated last year
- ☆20Updated last year
- enchmarking Large Language Models' Resistance to Malicious Code☆12Updated 10 months ago
- [ICLR 2025] REFINE: Inversion-Free Backdoor Defense via Model Reprogramming☆11Updated 7 months ago
- ☆19Updated last year
- ☆66Updated 5 years ago
- ☆223Updated last month
- ☆18Updated 4 years ago
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆52Updated 6 months ago