Login / Signup

Stealthy Backdoor Attack for Code Models.

Zhou YangBowen XuJie M. ZhangHong Jin KangJieke ShiJunda HeDavid Lo
Published in: CoRR (2023)
Keyphrases
  • probabilistic model
  • real time
  • neural network
  • information systems
  • case study
  • bayesian networks
  • lower bound
  • operating system
  • complex systems
  • statistical models