Intelligent Code Analysis by Computer Vision Techniques and Application to Vulnerability Prediction
☆10May 10, 2021Updated 4 years ago
Alternatives and similar repositories for Code2Image
Users that are interested in Code2Image are comparing it to the libraries listed below
Sorting:
- Reproduction package of the paper "DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning" in Automated S…☆20Feb 25, 2023Updated 3 years ago
- AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities☆43Apr 10, 2024Updated last year
- ☆10Aug 14, 2019Updated 6 years ago
- Protect Java Code from Decompilation, beyond Obfuscation☆13Nov 23, 2020Updated 5 years ago
- ☆21Dec 4, 2020Updated 5 years ago
- Detecting software vulnerability described public security reports with minimal training examples☆14Jun 11, 2021Updated 4 years ago
- ☆16Nov 24, 2023Updated 2 years ago
- ☆10Jul 19, 2023Updated 2 years ago
- Finds all elementary circuits of a directed graph using Johnson's algorithm (1975)☆16Jan 24, 2026Updated last month
- Learning from what we know: How to perform vulnerability prediction using noisy historical data, Empirical Software Engineering (EMSE)☆14Sep 20, 2023Updated 2 years ago
- Software similarity tester SIM☆16Feb 13, 2021Updated 5 years ago
- A distributed file system utilizing attribute-based encryption to achieve secure authentication, authorization, storage, and transmission…☆14May 18, 2017Updated 8 years ago
- ☆12Jul 31, 2025Updated 7 months ago
- This is the official repository of the paper Exploring Superior Function Calls via Reinforcement Learning.☆34Aug 11, 2025Updated 7 months ago
- Software vulnerability detection using machine learning through source codes (Exp-1). Replication of https://arxiv.org/abs/1807.04320.☆51Nov 24, 2021Updated 4 years ago
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆19Nov 24, 2023Updated 2 years ago
- ☆27Sep 11, 2024Updated last year
- A collection of data fetchers, and simple quarterly and yearly CVE forecasting models.☆46Oct 1, 2025Updated 5 months ago
- Learn Kubernetes by playing. Deploy pods, fix CrashLoopBackOff, type real kubectl commands: 3D browser game, no install needed.☆77Updated this week
- A library for standard containers and their associated algorithms.☆12Feb 28, 2025Updated last year
- Descriptor is a spec-style test structuring library for rust☆11Jun 19, 2016Updated 9 years ago
- GPTCloneBench is a clone detection benchmark based on SemanticCloneBench and GPT.☆16Feb 5, 2025Updated last year
- Legacy interface for Sushiswap standalone exchange☆22Oct 6, 2020Updated 5 years ago
- Deprecated. Please see https://github.com/OpenConceptLab/oclweb2☆11Jul 6, 2021Updated 4 years ago
- “火线~洞态IAST”是一款专为甲方安全人员、代码审计工程师和0 Day漏洞挖掘人员量身打造的辅助工具,可用于集成devops环 境进行漏洞检测、作为代码审计的辅助工具和自动化挖掘0 Day。☆24Jun 22, 2021Updated 4 years ago
- Web-client for glor.io - online game.☆13Sep 5, 2018Updated 7 years ago
- ☆18May 27, 2025Updated 9 months ago
- Rotate Your Screen☆10Apr 27, 2019Updated 6 years ago
- Post-deployment testing tool☆10Aug 5, 2016Updated 9 years ago
- Use features of rejected PEPs☆11Oct 11, 2019Updated 6 years ago
- Source code for EMSE 2023 paper "Zero-Shot Code Representation Learning via Prompt Tuning"☆13Feb 15, 2023Updated 3 years ago
- Information about how the python grammar has changed over time☆12Feb 13, 2024Updated 2 years ago
- Multi-platform native package builder toolkit☆15Aug 18, 2025Updated 7 months ago
- Universal, Register-based Virtual Machine☆11Mar 25, 2019Updated 6 years ago
- Shell made for a Systems Programming course in Fall 2013☆10Dec 15, 2015Updated 10 years ago
- Data-Driven Software Vulnerability Discovery (SVD)☆13May 27, 2020Updated 5 years ago
- An LR(1) parser generator, implemented as a proc macro☆16Apr 21, 2023Updated 2 years ago
- The nanovg demo on iOS for optimization purposes.☆10Mar 26, 2015Updated 10 years ago
- python threading.Event like class that has a file descriptor and can be used in select/poll☆12Sep 11, 2021Updated 4 years ago