☆23Nov 10, 2023Updated 2 years ago
Alternatives and similar repositories for VELVET
Users that are interested in VELVET are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10May 14, 2024Updated 2 years ago
- VulnerabilityDetectionResearch☆95Mar 22, 2022Updated 4 years ago
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆78Jun 24, 2022Updated 3 years ago
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆19Nov 24, 2023Updated 2 years ago
- Cyber Code Intelligence (CyberCI)☆14Dec 25, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Learning Program Semantics for Vulnerability Detection via Vulnerability-specific Inter-procedural Slicing☆14Aug 21, 2023Updated 2 years ago
- ☆56Nov 19, 2022Updated 3 years ago
- ☆22Nov 17, 2021Updated 4 years ago
- ☆22Mar 21, 2024Updated 2 years ago
- ☆227Jul 25, 2024Updated last year
- Fixing SySeVR.☆12Sep 23, 2021Updated 4 years ago
- A vulnerability patch gathering tool☆44Jan 11, 2019Updated 7 years ago
- ☆13May 28, 2023Updated 2 years ago
- BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection☆10Oct 2, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆16Aug 16, 2023Updated 2 years ago
- FUNDED is a novel learning framework for building vulnerability detection models.☆130Dec 6, 2023Updated 2 years ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆42Dec 29, 2023Updated 2 years ago
- Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection☆15Dec 19, 2022Updated 3 years ago
- Replication package for "Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection", ICSE 2024.☆76Sep 24, 2024Updated last year
- ☆16Nov 20, 2022Updated 3 years ago
- AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities☆42Apr 10, 2024Updated 2 years ago
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆75May 27, 2022Updated 3 years ago
- ☆16Jan 17, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆50Jan 19, 2019Updated 7 years ago
- Open-source repository for the ISSTA'23 paper "CONCORD: Clone-aware Contrastive Learning for Source Code"☆11Nov 10, 2023Updated 2 years ago
- ☆29Nov 7, 2022Updated 3 years ago
- Multi-granularity vulnerability detection with a novel pre-trained code model☆19Dec 15, 2025Updated 5 months ago
- ☆10Apr 15, 2023Updated 3 years ago
- A deep learning model for localizing bugs in C/C++ source code (USENIX'23)☆160Jun 28, 2023Updated 2 years ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆63Feb 23, 2024Updated 2 years ago
- Simplified Source Code Pre-Training for Vulnerability Detection☆118Dec 4, 2025Updated 5 months ago
- A deep learning-based vulnerability detection framework☆76Feb 29, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆89Feb 1, 2021Updated 5 years ago
- ☆13Feb 29, 2024Updated 2 years ago
- Reproduction package of the paper "DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning" in Automated S…☆21Feb 25, 2023Updated 3 years ago
- Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks☆258Jan 19, 2024Updated 2 years ago
- VulDeePecker: A Deep Learning-Based System for Vulnerability Detection☆352Nov 17, 2020Updated 5 years ago
- ☆104Oct 25, 2024Updated last year
- Code for ICSE'24 Paper☆14Apr 21, 2024Updated 2 years ago