You see what I want you to see: poisoning vulnerabilities in neural code search

Author:

Wan Yao1,Zhang Shijie1,Zhang Hongyu2,Sui Yulei3,Xu Guandong3,Yao Dezhong1,Jin Hai1,Sun Lichao4

Affiliation:

1. Huazhong University of Science and Technology, China

2. University of Newcastle, Australia

3. University of Technology Sydney, Australia

4. Lehigh University, USA

Publisher

ACM

Reference45 articles.

1. 2022. BitBucket. bitbucket.org [Online ; accessed 1- Mar- 2022 ]. 2022. BitBucket. bitbucket.org [Online; accessed 1-Mar-2022].

2. 2022. GitHub. https://www.github.com [Online ; accessed 1- Mar- 2022 ]. 2022. GitHub. https://www.github.com [Online; accessed 1-Mar-2022].

3. Unified Pre-training for Program Understanding and Generation

4. Pavol Bielik and Martin T. Vechev . 2020. Adversarial Robustness for Code . In Proceedings of the 37th International Conference on Machine Learning, ICML 2020 , 13-18 July 2020 , Virtual Event (Proceedings of Machine Learning Research , Vol. 119). PMLR, 896– 907 . Pavol Bielik and Martin T. Vechev. 2020. Adversarial Robustness for Code. In Proceedings of the 37th International Conference on Machine Learning, ICML 2020, 13-18 July 2020, Virtual Event (Proceedings of Machine Learning Research, Vol. 119). PMLR, 896–907.

5. When deep learning met code search

Cited by 18 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. FDI: Attack Neural Code Generation Systems through User Feedback Channel;Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis;2024-09-11

2. Deep learning for code generation: a survey;Science China Information Sciences;2024-08-20

3. LateBA: Latent Backdoor Attack on Deep Bug Search via Infrequent Execution Codes;Proceedings of the 15th Asia-Pacific Symposium on Internetware;2024-07-24

4. Measuring Impacts of Poisoning on Model Parameters and Embeddings for Large Language Models of Code;Proceedings of the 1st ACM International Conference on AI-Powered Software;2024-07-10

5. Human-Imperceptible Retrieval Poisoning Attacks in LLM-Powered Applications;Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering;2024-07-10

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3