☆16Aug 16, 2023Updated 2 years ago
Alternatives and similar repositories for REEF-data
Users that are interested in REEF-data are comparing it to the libraries listed below
Sorting:
- ☆16Aug 26, 2023Updated 2 years ago
- Learning Program Semantics for Vulnerability Detection via Vulnerability-specific Inter-procedural Slicing☆14Aug 21, 2023Updated 2 years ago
- ☆13Feb 29, 2024Updated 2 years ago
- [ASE2024] Mutual Learning-Based Framework for Enhancing Robustness of Code Models via Adversarial Training☆11Sep 13, 2024Updated last year
- ☆11May 14, 2024Updated last year
- ☆16Nov 20, 2022Updated 3 years ago
- VulnerabilityDetectionResearch☆94Mar 22, 2022Updated 3 years ago
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆19Nov 24, 2023Updated 2 years ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆42Dec 29, 2023Updated 2 years ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆63Feb 23, 2024Updated 2 years ago
- This repository contains a PyTorch implementation of the ISSTA'24 paper "Graph Neural Networks for Vulnerability Detection: A Counterfact…☆34Jun 6, 2025Updated 9 months ago
- ☆23Nov 10, 2023Updated 2 years ago
- ☆10Apr 15, 2023Updated 2 years ago
- [2023 TDSC] Pre-trained Model-based Automated Software Vulnerability Repair: How Far are We?☆25Jun 2, 2023Updated 2 years ago
- A transformer-based VS Code extension that enables one to discover vulnerabilities in Java files.☆12Dec 1, 2022Updated 3 years ago
- Data-Driven Software Vulnerability Discovery (SVD)☆13May 27, 2020Updated 5 years ago
- Code for ICSE'24 Paper☆14Apr 21, 2024Updated last year
- A Transformer-based Line-Level Vulnerability Prediction☆162Aug 5, 2024Updated last year
- ☆15Jan 17, 2024Updated 2 years ago
- ☆14Mar 3, 2022Updated 4 years ago
- ☆12Jan 19, 2022Updated 4 years ago
- A tool based on python to parse C/C++ code into code property graph☆17Nov 4, 2022Updated 3 years ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38May 10, 2018Updated 7 years ago
- [ICSE'24 Industry Challenge Track] "ReposVul: A Repository-Level High-Quality Vulnerability Dataset".☆93Nov 24, 2024Updated last year
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆115Aug 9, 2022Updated 3 years ago
- Program Transformation Tool for Java Methods☆11Sep 16, 2022Updated 3 years ago
- ☆13May 28, 2023Updated 2 years ago
- ☆22Mar 21, 2024Updated last year
- Vision Transformer-Inspired Automated Vulnerability Repair☆19May 13, 2025Updated 10 months ago
- Soot-based taint analysis with internal Java fluent interface for security specifications in fluentTQL implemented with MagpieBridge to s…☆18Jan 30, 2025Updated last year
- ☆25Apr 25, 2024Updated last year
- AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities☆43Apr 10, 2024Updated last year
- Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection☆15Dec 19, 2022Updated 3 years ago
- SeqTrans: Automatic Vulnerability Fix via Sequence to Sequence Learning☆17Mar 9, 2022Updated 4 years ago
- The Scott-Knott Effect Size Difference (ESD) test☆44Feb 9, 2023Updated 3 years ago
- FUNDED is a novel learning framework for building vulnerability detection models.☆129Dec 6, 2023Updated 2 years ago
- ☆23Aug 6, 2020Updated 5 years ago
- [ASE'23] When Less is Enough: Positive-Unlabeled Learning Model for Vulnerability Detection☆16Jan 12, 2024Updated 2 years ago
- Replication Package for "Natural Attack for Pre-trained Models of Code", ICSE 2022☆52Nov 7, 2025Updated 4 months ago