1 code implementation • 12 Feb 2022 • Zhen Li, Guenevere, Chen, Chen Chen, Yayi Zou, Shouhuai Xu
Recent studies show that current source code authorship attribution methods can be compromised by attackers exploiting adversarial examples and coding style manipulation.