Login / Signup
An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection.
Shenao Yan
Shen Wang
Yue Duan
Hanbin Hong
Kiho Lee
Doowon Kim
Yuan Hong
Published in:
CoRR (2024)
Keyphrases
</>
false positives
probabilistic model
complex systems
automatic detection
statistical models
countermeasures
security vulnerabilities
prior knowledge
object detection
open source
anomaly detection
parameter estimation
detection method
detection mechanism
security risks
attack detection