Pinned Repositories
AdvCLIP
The implementation of our ACM MM 2023 paper "AdvCLIP: Downstream-agnostic Adversarial Examples in Multimodal Contrastive Learning"
AdvEncoder
The implementation of our ICCV 2023 paper "Downstream-agnostic Adversarial Examples"
AMT-GAN
The official implementation of our CVPR 2022 paper "Protecting Facial Privacy: Generating Adversarial Identity Masks via Style-robust Makeup Transfer".
Android-Container
Method on running Linux containers (Docker) on the android platform. Migrate container from X86-Based ubuntu to ARM-Based android.
gECC
gECC: A GPU-based high-throughput framework for Elliptic Curve Cryptography
naturalcc
NaturalCC: An Open-Source Toolkit for Code Intelligence
SCVDT
Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ programs, and other security service.
VulCNN
VulDeePecker
VulDeePecker: A Deep Learning-Based System for Vulnerability Detection
YiTu
YiTu is an easy-to-use runtime to fully exploit the hybrid parallelism of different hardwares (e.g., GPU) to efficiently support the execution of various kinds of graph algorithms (e.g., GNNs).
CGCL-codes's Repositories
CGCL-codes/YiTu
YiTu is an easy-to-use runtime to fully exploit the hybrid parallelism of different hardwares (e.g., GPU) to efficiently support the execution of various kinds of graph algorithms (e.g., GNNs).
CGCL-codes/naturalcc
NaturalCC: An Open-Source Toolkit for Code Intelligence
CGCL-codes/PathEval
This is an evaluation set for the problem of directed/targeted test input generation. We use it to benchmark the ability of Large Language Models for generating inputs to reach a certain code location or produce a particular result.
CGCL-codes/TransferAttackSurrogates
The official code of IEEE S&P 2024 paper "Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability". We study how to train surrogates model for boosting transfer attack.
CGCL-codes/Amain
Detecting Semantic Code Clones by Building AST-based Markov Chains Model
CGCL-codes/MorphDAG-prototype
Released code of the MorphDAG prototype (version 2.0)
CGCL-codes/FIRE
FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.
CGCL-codes/DarkSAM
The implementation of our NeurIPS 2024 paper "DarkSAM: Fooling Segment Anything Model to Segment Nothing".
CGCL-codes/UnlearnablePC
Official code for the NeurIPS 2024 paper "Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need"
CGCL-codes/Cross-links-Bias
Implementation for NeurIPS 2023 paper: Cross-links Matter for Link Prediction: Rethinking the Debiased GNN from a Data Perspective
CGCL-codes/VFFinder
CGCL-codes/gECC
gECC: A GPU-based high-throughput framework for Elliptic Curve Cryptography
CGCL-codes/MorphDAG
The implementation of our TKDE'24 paper "MorphDAG: A Workload-Aware Elastic DAG-based blockchain"
CGCL-codes/NumbOD
The implementation of our AAAI 2025 paper "NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors"
CGCL-codes/ApSpGEMM
CGCL-codes/BIVBench
CGCL-codes/NIFA
[NeurIPS 2024] Are Your Models Still Fair? Fairness Attacks on Graph Neural Networks via Node Injections.
CGCL-codes/PatchEvolution
CGCL-codes/AegonKV
CGCL-codes/Anole
Source code of our DASFAA 2023 paper "Anole: A Lightweight and Verifiable Learned-based Index for Time Range Query on Blockchain Systems"
CGCL-codes/Cloak
Source code of our IEEE TSC 2024 paper "Cloak: Hiding Retrieval Information in Blockchain Systems via Distributed Query Requests"
CGCL-codes/Distributed-Learning-Networking
CGCL-codes/IBSF
CGCL-codes/LibHunter
CGCL-codes/NaFV-Net
This repository includes the implementation for our AAAI25 paper: NaFV-Net: An Adversarial Four-view Network for Mammogram Classification
CGCL-codes/pako
Implement the accepted paper [TC'24] Pako in Rust
CGCL-codes/Remora
Implement the accepted paper [TC'24] Remora in Golang
CGCL-codes/RFCoA
CGCL-codes/Ripple
CGCL-codes/SeerEVM
The implementation of our VLDB 2025 paper "Seer: Accelerating Blockchain Transaction Execution by Fine-Grained Branch Prediction"