{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:31:08Z","timestamp":1769722268012,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T00:00:00Z","timestamp":1729987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"NSFC","award":["92270204"],"award-info":[{"award-number":["92270204"]}]},{"name":"CAS Project for Young Scientists in Basic Research","award":["YSBR-118"],"award-info":[{"award-number":["YSBR-118"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,27]]},"DOI":"10.1145\/3691620.3695517","type":"proceedings-article","created":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T15:39:19Z","timestamp":1729265959000},"page":"1460-1471","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Attribution-guided Adversarial Code Prompt Generation for Code Completion Models"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8687-3926","authenticated-orcid":false,"given":"Xueyang","family":"Li","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6388-2571","authenticated-orcid":false,"given":"Guozhu","family":"Meng","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5598-4006","authenticated-orcid":false,"given":"Shangqing","family":"Liu","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7959-7433","authenticated-orcid":false,"given":"Lu","family":"Xiang","sequence":"additional","affiliation":[{"name":"SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-8343-3737","authenticated-orcid":false,"given":"Kun","family":"Sun","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5624-2987","authenticated-orcid":false,"given":"Kai","family":"Chen","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9082-3208","authenticated-orcid":false,"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7300-9215","authenticated-orcid":false,"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2024,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/aws.amazon.com\/cn\/codewhisperer\/, as of","author":"CodeWhisperer Amazon","year":"2024","unstructured":"2022. Amazon CodeWhisperer. https:\/\/aws.amazon.com\/cn\/codewhisperer\/, as of September 16, 2024."},{"key":"e_1_3_2_1_2_1","unstructured":"2022. CodeParrot Dataset Cleaned. https:\/\/huggingface.co\/datasets\/codeparrot\/codeparrot-clean"},{"key":"e_1_3_2_1_3_1","volume-title":"https:\/\/github.com\/features\/copilot, as of","author":"Copilot GitHub","year":"2024","unstructured":"2022. GitHub Copilot. https:\/\/github.com\/features\/copilot, as of September 16, 2024."},{"key":"e_1_3_2_1_4_1","unstructured":"2023. ADVPRO. https:\/\/sites.google.com\/view\/advpro"},{"key":"e_1_3_2_1_5_1","unstructured":"2023. CWE VIEW: Research Concepts. https:\/\/cwe.mitre.org\/data\/definitions\/1000.html"},{"key":"e_1_3_2_1_6_1","unstructured":"2023. NIST National Vulnerability Database. https:\/\/nvd.nist.gov\/"},{"key":"e_1_3_2_1_7_1","unstructured":"2023. The Python Language Reference. https:\/\/docs.python.org\/3\/reference\/index.html"},{"key":"e_1_3_2_1_8_1","unstructured":"2023. The Stack v1.1. https:\/\/huggingface.co\/datasets\/bigcode\/the-stack"},{"key":"e_1_3_2_1_9_1","unstructured":"2023. The Stack v1.2. https:\/\/huggingface.co\/datasets\/bigcode\/starcoderdata"},{"key":"e_1_3_2_1_10_1","volume-title":"Niklas Muennighoff, Mayank Mishra, Alex Gu, Manan Dey, et al.","author":"Allal Loubna Ben","year":"2023","unstructured":"Loubna Ben Allal, Raymond Li, Denis Kocetkov, Chenghao Mou, Christopher Akiki, Carlos Munoz Ferrandis, Niklas Muennighoff, Mayank Mishra, Alex Gu, Manan Dey, et al. 2023. SantaCoder: don't reach for the stars! arXiv preprint arXiv:2301.03988 (2023)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Owura Asare Meiyappan Nagappan and N. Asokan. 2022. Is GitHub's Copilot as Bad As Humans at Introducing Vulnerabilities in Code? (Apr 2022).","DOI":"10.1007\/s10664-023-10380-1"},{"key":"e_1_3_2_1_12_1","unstructured":"MarkI-Cheng Chen Jerry Tworek Heewoo Jun Qiming Yuan HenriquePondedeOliveira Pinto Jared Kaplan Harrison Edwards Yuri Burda Nicholas Joseph Greg Brockman AlexK. Ray Raul Puri Gretchen Krueger MichaelA. Petrov Heidy Khlaaf Girish Sastry Pamela Mishkin Brooke Chan Scott Gray N.C. Ryder Mikhail Pavlov Alethea. Power Lukasz Kaiser Mohammad Bavarian Clemens Winter Philippe Tillet FelipePetroski Such Dave Cummings Matthias Plappert Fotios Chantzis ElizabethA. Barnes Ariel Herbert-Voss WilliamC. Guss Alex Nichol Alex Paino Nikolas Tezak Jie Tang Igor Babuschkin Suchir Balaji Shantanu Jain WilliamH. Saunders Christopher Hesse Andrew Carr Jan Leike Joshua Achiam Vedant Misra Evan Morikawa Alec Radford MatthewM. Knight Miles Brundage Mira Murati Katie Mayer Peter Welinder Bob McGrew Dario Amodei Samuel McCandlish Ilya Sutskever and Wojciech Zaremba. 2021. Evaluating Large Language Models Trained on Code. Cornell University - arXiv Cornell University - arXiv (Jul 2021)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"e_1_3_2_1_14_1","volume-title":"GraphCodeBERT: Pre-training Code Representations with Data Flow","author":"Guo Daya","year":"2020","unstructured":"Daya Guo, Shuo Ren, Shuai Lu, Zhangyin Feng, Duyu Tang, Shujie Liu, Long Zhou, Nan Duan, Alexey Svyatkovskiy, Fu Shengyu, Michele Tufano, ShaoKun Deng, ColinB. Clement, Dawn Drain, Neel Sundaresan, Jian Yin, Daxin Jiang, and Ming Zhou. 2020. GraphCodeBERT: Pre-training Code Representations with Data Flow. Cornell University - arXiv,Cornell University - arXiv (Sep 2020)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3650212.3652130"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i14.17533"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i12.26739"},{"key":"e_1_3_2_1_18_1","unstructured":"Eirini Kalliamvakou. 2022. Research: Quantifying GitHub Copilot's Impact on Developer Productivity and Happiness. https:\/\/github.blog\/2022-09-07-research-quantifying-github-copilots-impact-on-developer-productivity-and-happiness\/"},{"key":"e_1_3_2_1_19_1","unstructured":"Raymond Li Loubna Ben Allal Yangtian Zi Niklas Muennighoff Denis Kocetkov Chenghao Mou Marc Marone Christopher Akiki Jia Li Jenny Chim Qian Liu Evgenii Zheltonozhskii Terry Yue Zhuo Thomas Wang Olivier Dehaene Mishig Davaadorj Joel Lamy-Poirier Jo\u00e3o Monteiro Oleh Shliazhko Nicolas Gontier Nicholas Meade Armel Zebaze Ming-Ho Yee Logesh Kumar Umapathi Jian Zhu Benjamin Lipkin Muhtasham Oblokulov Zhiruo Wang Rudra Murthy Jason Stillerman Siva Sankalp Patel Dmitry Abulkhanov Marco Zocca Manan Dey Zhihan Zhang Nour Fahmy Urvashi Bhattacharyya Wenhao Yu Swayam Singh Sasha Luccioni Paulo Villegas Maxim Kunakov Fedor Zhdanov Manuel Romero Tony Lee Nadav Timor Jennifer Ding Claire Schlesinger Hailey Schoelkopf Jan Ebert Tri Dao Mayank Mishra Alex Gu Jennifer Robinson Carolyn Jane Anderson Brendan Dolan-Gavitt Danish Contractor Siva Reddy Daniel Fried Dzmitry Bahdanau Yacine Jernite Carlos Mu\u00f1oz Ferrandis Sean Hughes Thomas Wolf Arjun Guha Leandro von Werra and Harm de Vries. 2023. StarCoder: may the source be with you! (2023). arXiv:2305.06161 [cs.CL]"},{"key":"e_1_3_2_1_20_1","volume-title":"Multi-target backdoor attacks for code pre-trained models. arXiv preprint arXiv:2306.08350","author":"Li Yanzhou","year":"2023","unstructured":"Yanzhou Li, Shangqing Liu, Kangjie Chen, Xiaofei Xie, Tianwei Zhang, and Yang Liu. 2023. Multi-target backdoor attacks for code pre-trained models. arXiv preprint arXiv:2306.08350 (2023)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510181"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00110"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00207"},{"key":"e_1_3_2_1_24_1","unstructured":"Nhan Nguyen and Sarah Nadi. 0. An empirical evaluation of GitHub copilot's code suggestions. (0)."},{"key":"e_1_3_2_1_25_1","volume-title":"CodeGen2: Lessons for Training LLMs on Programming and Natural Languages. arXiv preprint","author":"Nijkamp Erik","year":"2023","unstructured":"Erik Nijkamp, Hiroaki Hayashi, Caiming Xiong, Silvio Savarese, and Yingbo Zhou. 2023. CodeGen2: Lessons for Training LLMs on Programming and Natural Languages. arXiv preprint (2023)."},{"key":"e_1_3_2_1_26_1","volume-title":"A Conversational Paradigm for Program Synthesis. arXiv preprint","author":"Nijkamp Erik","year":"2022","unstructured":"Erik Nijkamp, Bo Pang, Hiroaki Hayashi, Lifu Tu, Huan Wang, Yingbo Zhou, Silvio Savarese, and Caiming Xiong. 2022. A Conversational Paradigm for Program Synthesis. arXiv preprint (2022)."},{"key":"e_1_3_2_1_27_1","unstructured":"OpenAI. 2022. ChatGPT: Optimizing Language Models for Dialogue. https:\/\/openai.com\/blog\/chatgpt"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 40th annual meeting of the Association for Computational Linguistics. 311--318","author":"Papineni Kishore","year":"2002","unstructured":"Kishore Papineni, Salim Roukos, Todd Ward, and Wei-Jing Zhu. 2002. Bleu: a method for automatic evaluation of machine translation. In Proceedings of the 40th annual meeting of the Association for Computational Linguistics. 311--318."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/sp46214.2022.9833571"},{"key":"e_1_3_2_1_31_1","unstructured":"Alec Radford Jeffrey Wu Rewon Child David Luan Dario Amodei Ilya Sutskever et al. 2019. Language models are unsupervised multitask learners. OpenAI blog 1 8 (2019) 9."},{"key":"e_1_3_2_1_32_1","volume-title":"Security implications of large language model code assistants: A user study. arXiv preprint arXiv:2208.09727","author":"Sandoval Gustavo","year":"2022","unstructured":"Gustavo Sandoval, Hammond Pearce, Teo Nys, Ramesh Karri, Brendan Dolan-Gavitt, and Siddharth Garg. 2022. Security implications of large language model code assistants: A user study. arXiv preprint arXiv:2208.09727 (2022)."},{"key":"e_1_3_2_1_33_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Schuster Roei","year":"2021","unstructured":"Roei Schuster, Congzheng Song, Eran Tromer, and Vitaly Shmatikov. 2021. You autocomplete me: Poisoning vulnerabilities in neural code completion. In 30th USENIX Security Symposium (USENIX Security 21). 1559--1575."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3549035.3561184"},{"key":"e_1_3_2_1_35_1","volume-title":"Deep Inside Convolutional Networks: Visualising Image Classification Models and Saliency Maps","author":"Simonyan Karen","year":"2013","unstructured":"Karen Simonyan, Andrea Vedaldi, and Andrew Zisserman. 2013. Deep Inside Convolutional Networks: Visualising Image Classification Models and Saliency Maps. Cornell University - arXiv,Cornell University - arXiv (Dec 2013)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00076"},{"key":"e_1_3_2_1_37_1","unstructured":"Hugo Touvron Thibaut Lavril Gautier Izacard Xavier Martinet Marie-Anne Lachaux Timoth\u00e9e Lacroix Baptiste Rozi\u00e8re Naman Goyal Eric Hambro Faisal Azhar Aurelien Rodriguez Armand Joulin Edouard Grave and Guillaume Lample. 2023. LLaMA: Open and Efficient Foundation Language Models. arXiv:2302.13971 [cs.CL]"},{"key":"e_1_3_2_1_38_1","volume-title":"Leandro Von Werra, and Thomas Wolf","author":"Tunstall Lewis","year":"2022","unstructured":"Lewis Tunstall, Leandro Von Werra, and Thomas Wolf. 2022. Natural language processing with transformers. \" O'Reilly Media, Inc.\"."},{"key":"e_1_3_2_1_39_1","volume-title":"Expectation vs. Experience: Evaluating the Usability of Code Generation Tools Powered by Large Language Models. (Apr","author":"Vaithilingam Priyan","year":"2022","unstructured":"Priyan Vaithilingam, Tianyi Zhang, and ElenaL. Glassman. 2022. Expectation vs. Experience: Evaluating the Usability of Code Generation Tools Powered by Large Language Models. (Apr 2022)."},{"key":"e_1_3_2_1_40_1","volume-title":"Neural Information Processing Systems (Jun","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, AidanN. Gomez, Lukasz Kaiser, and Illia Polosukhin. 2017. Attention is All you Need. Neural Information Processing Systems, Neural Information Processing Systems (Jun 2017)."},{"key":"e_1_3_2_1_41_1","unstructured":"FrankF. Xu Uri Alon Graham Neubig and VincentJ. Hellendoorn. 0. A Systematic Evaluation of Large Language Models of Code. (0)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3520312.3534862"},{"key":"e_1_3_2_1_43_1","volume-title":"AD-DROP: Attribution-Driven Dropout for Robust Language Model Fine-Tuning. (Oct","author":"Yang Tao","year":"2022","unstructured":"Tao Yang, Jinghao Deng, Xiaojun Quan, Qifan Wang, and Shaoliang Nie. 2022. AD-DROP: Attribution-Driven Dropout for Robust Language Model Fine-Tuning. (Oct 2022)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510146"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428230"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3511887","article-title":"Towards robustness of deep program processing models---detection, estimation, and enhancement","volume":"31","author":"Zhang Huangzhao","year":"2022","unstructured":"Huangzhao Zhang, Zhiyi Fu, Ge Li, Lei Ma, Zhehao Zhao, Hua'an Yang, Yizhe Sun, Yang Liu, and Zhi Jin. 2022. Towards robustness of deep program processing models---detection, estimation, and enhancement. ACM Transactions on Software Engineering and Methodology (TOSEM) 31, 3 (2022), 1--40.","journal-title":"ACM Transactions on Software Engineering and Methodology (TOSEM)"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5469"},{"key":"e_1_3_2_1_48_1","volume-title":"Yves Le Traon, and Yang Liu","author":"Zhang Jie","year":"2023","unstructured":"Jie Zhang, Wei Ma, Qiang Hu, Shangqing Liu, Xiaofei Xie, Yves Le Traon, and Yang Liu. 2023. A Black-Box Attack on Code Models via Representation Nearest Neighbor Search. arXiv preprint arXiv:2305.05896 (2023)."}],"event":{"name":"ASE '24: 39th IEEE\/ACM International Conference on Automated Software Engineering","location":"Sacramento CA USA","acronym":"ASE '24","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 39th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3691620.3695517","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3691620.3695517","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:06:19Z","timestamp":1750291579000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3691620.3695517"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,27]]},"references-count":47,"alternative-id":["10.1145\/3691620.3695517","10.1145\/3691620"],"URL":"https:\/\/doi.org\/10.1145\/3691620.3695517","relation":{},"subject":[],"published":{"date-parts":[[2024,10,27]]},"assertion":[{"value":"2024-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}