day day up
Stealthy Backdoor Attack for Code Models Stealthy Backdoor Attack for Code Models
Stealthy Backdoor Attack for Code ModelsPart1. title&SourceTitle: Stealthy Backdoor Attack for Code ModelsSource:
2024-10-31
Large Language Models for Secure Code Assessment A Multi-Language Empirical Study Language Models Large Language Models for Secure Code Assessment A Multi-Language Empirical Study Language Models
Large Language Models for Secure Code Assessment: A Multi-Language Empirical StudyPart1. Title & Source Title: Lar
2024-10-26
VulDetectBench Evaluating the Deep Capability of Vulnerability Detection with Large Language Models VulDetectBench Evaluating the Deep Capability of Vulnerability Detection with Large Language Models
VulDetectBench: Evaluating the Deep Capability of Vulnerability Detection with LargePart1. Title & Source Title:
2024-10-25
Code Vulnerability Detection A Comparative Analysis of Emerging Large Language Models Code Vulnerability Detection A Comparative Analysis of Emerging Large Language Models
Code Vulnerability Detection: A Comparative Analysis of Emerging Large Language ModelsPart1. title&SourceTitle: Co
2024-10-25
VulBERTa Simplified Source Code Pre-Training for Vulnerability Detection VulBERTa Simplified Source Code Pre-Training for Vulnerability Detection
VulBERTa: Simplified Source Code Pre-Training for Vulnerability DetectionPart1. Title & SourceTitle: VulBERTa: Sim
2024-10-24
SySeVR A Framework for Using Deep Learning to Detect Software Vulnerabilities SySeVR A Framework for Using Deep Learning to Detect Software Vulnerabilities
SySeVR: A Framework for Using Deep Learning to Detect Software VulnerabilitiesPart 1. Title & SourceTitle: SySeVR:
2024-10-24
A Search-Based Testing Framework for Deep Neural Networks of Source Code Embedding A Search-Based Testing Framework for Deep Neural Networks of Source Code Embedding
A Search-Based Testing Framework for Deep Neural Networks of Source Code EmbeddingPart 1. Title & SourceTitle: A S
2024-10-23
Generating Adversarial Examples for Holding Robustness of Source Code Processing Models Generating Adversarial Examples for Holding Robustness of Source Code Processing Models
Generating Adversarial Examples for Holding Robustness of Source Code Processing ModelsPart1. title&SourceTitle: G
2024-10-22
Adversarial Examples for Models of Code Adversarial Examples for Models of Code
Adversarial Examples for Models of CodeOOPSLA Part1. Title&SourceTitle: Adversarial Examples for Models of CodeAu
2024-10-20
BERT-ATTACK Adversarial Attack Against BERT Using BERT BERT-ATTACK Adversarial Attack Against BERT Using BERT
BERT-ATTACK Adversarial Attack Against BERT Using BERT Part 1. Title & SourceTitle: BERT-ATTACK: Adversarial Attac
2024-10-16
2 / 4