DanielLin1986 / TransferRepresentationLearning
Cross-Project Transfer Representation Learning for Vulnerable Function Discovery
☆35Updated 6 years ago
Alternatives and similar repositories for TransferRepresentationLearning:
Users that are interested in TransferRepresentationLearning are comparing it to the libraries listed below
- Maximal Divergence Sequential Autoencoder for Binary Software Vulnerability Detection☆21Updated 6 years ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆37Updated 6 years ago
- A deep learning-based vulnerability detection framework☆75Updated last year
- Labeled vulnerable functions statistics analysis and neural network training☆26Updated 5 years ago
- ☆46Updated 6 years ago
- ☆95Updated 5 months ago
- ☆22Updated 5 years ago
- ☆22Updated 2 years ago
- Data-Driven Software Vulnerability Discovery (SVD)☆13Updated 4 years ago
- ☆83Updated 4 years ago
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆103Updated 2 years ago
- CD-VulD based on DR and TL☆8Updated 6 years ago
- ☆22Updated last year
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆69Updated 2 years ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆61Updated last year
- VulnerabilityDetectionResearch☆84Updated 3 years ago
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆71Updated 2 years ago
- ☆19Updated 2 years ago
- FUNDED is a novel learning framework for building vulnerability detection models.☆128Updated last year
- ☆19Updated 4 years ago
- A static-analysis tool to detect C/C++ vulnerabilities based on graph comparison☆26Updated 4 years ago
- ☆72Updated last year
- ☆22Updated 3 years ago
- The dataset used in the experiments for Esh (http://binsim.com)☆21Updated 8 years ago
- ☆24Updated 2 years ago
- VulDeePecker algorithm implemented in Python☆113Updated 5 years ago
- ☆49Updated 4 years ago
- The replication package of paper "Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks"☆22Updated last year
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Updated 2 years ago
- ☆14Updated last year