☆16Aug 16, 2023Updated 2 years ago
Alternatives and similar repositories for REEF-data
Users that are interested in REEF-data are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Aug 26, 2023Updated 2 years ago
- Learning Program Semantics for Vulnerability Detection via Vulnerability-specific Inter-procedural Slicing☆14Aug 21, 2023Updated 2 years ago
- ☆13Feb 29, 2024Updated 2 years ago
- [ASE2024] Mutual Learning-Based Framework for Enhancing Robustness of Code Models via Adversarial Training☆11Sep 13, 2024Updated last year
- ☆10May 14, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- VulnerabilityDetectionResearch☆94Mar 22, 2022Updated 4 years ago
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆19Nov 24, 2023Updated 2 years ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆42Dec 29, 2023Updated 2 years ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆63Feb 23, 2024Updated 2 years ago
- [ICSE'24 Industry Challenge Track] "ReposVul: A Repository-Level High-Quality Vulnerability Dataset".☆104Nov 24, 2024Updated last year
- This repository contains a PyTorch implementation of the ISSTA'24 paper "Graph Neural Networks for Vulnerability Detection: A Counterfact…☆34Jun 6, 2025Updated 11 months ago
- ☆23Nov 10, 2023Updated 2 years ago
- ☆10Apr 15, 2023Updated 3 years ago
- [2023 TDSC] Pre-trained Model-based Automated Software Vulnerability Repair: How Far are We?☆25Jun 2, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A transformer-based VS Code extension that enables one to discover vulnerabilities in Java files.☆12Dec 1, 2022Updated 3 years ago
- Data-Driven Software Vulnerability Discovery (SVD)☆13May 27, 2020Updated 5 years ago
- A Transformer-based Line-Level Vulnerability Prediction☆171Aug 5, 2024Updated last year
- ☆16Jan 17, 2024Updated 2 years ago
- Code for ICSE'24 Paper☆14Apr 21, 2024Updated 2 years ago
- ☆14Mar 3, 2022Updated 4 years ago
- A tool based on python to parse C/C++ code into code property graph☆17Nov 4, 2022Updated 3 years ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38May 10, 2018Updated 8 years ago
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆117Apr 7, 2026Updated last month
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Program Transformation Tool for Java Methods☆11Sep 16, 2022Updated 3 years ago
- ☆13May 28, 2023Updated 2 years ago
- ☆22Mar 21, 2024Updated 2 years ago
- Vision Transformer-Inspired Automated Vulnerability Repair☆19May 13, 2025Updated last year
- Soot-based taint analysis with internal Java fluent interface for security specifications in fluentTQL implemented with MagpieBridge to s…☆18Jan 30, 2025Updated last year
- AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities☆42Apr 10, 2024Updated 2 years ago
- Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection☆15Dec 19, 2022Updated 3 years ago
- SeqTrans: Automatic Vulnerability Fix via Sequence to Sequence Learning☆17Mar 9, 2022Updated 4 years ago
- ☆26Apr 25, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- The Scott-Knott Effect Size Difference (ESD) test☆44Feb 9, 2023Updated 3 years ago
- FUNDED is a novel learning framework for building vulnerability detection models.☆130Dec 6, 2023Updated 2 years ago
- ☆22Aug 6, 2020Updated 5 years ago
- Replication Package for "Natural Attack for Pre-trained Models of Code", ICSE 2022☆52Nov 7, 2025Updated 6 months ago
- [ASE'23] When Less is Enough: Positive-Unlabeled Learning Model for Vulnerability Detection☆16Jan 12, 2024Updated 2 years ago
- VulRepair: A T5-Based Automated Software Vulnerability Repair☆84May 13, 2025Updated last year
- Software Vulnerabilities to Weakness Mapping☆24Feb 24, 2022Updated 4 years ago