[ASE'23] When Less is Enough: Positive-Unlabeled Learning Model for Vulnerability Detection
☆16Jan 12, 2024Updated 2 years ago
Alternatives and similar repositories for PILOT
Users that are interested in PILOT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for ICSE'24 Paper☆14Apr 21, 2024Updated last year
- ☆13Feb 29, 2024Updated 2 years ago
- ☆16Nov 20, 2022Updated 3 years ago
- ☆13May 28, 2023Updated 2 years ago
- CodeRepoQA dataset☆15Feb 19, 2025Updated last year
- ☆15Jan 17, 2024Updated 2 years ago
- ☆54Nov 19, 2022Updated 3 years ago
- Multi-granularity vulnerability detection with a novel pre-trained code model☆19Dec 15, 2025Updated 3 months ago
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆19Nov 24, 2023Updated 2 years ago
- ☆16Aug 26, 2023Updated 2 years ago
- The replication package of paper "Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks"☆28Jan 3, 2024Updated 2 years ago
- [ICSE'24 Industry Challenge Track] "ReposVul: A Repository-Level High-Quality Vulnerability Dataset".☆93Nov 24, 2024Updated last year
- CONCOCTION is an automated machine learning-based vulnerability detection framework that combines static source code information and dyna…☆27Aug 18, 2024Updated last year
- ☆11May 14, 2024Updated last year
- Learning Program Semantics for Vulnerability Detection via Vulnerability-specific Inter-procedural Slicing☆14Aug 21, 2023Updated 2 years ago
- ☆21May 10, 2022Updated 3 years ago
- VulnerabilityDetectionResearch☆94Mar 22, 2022Updated 4 years ago
- ☆16Aug 16, 2023Updated 2 years ago
- ☆82Jul 11, 2023Updated 2 years ago
- Replication package for "Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection", ICSE 2024.☆74Sep 24, 2024Updated last year
- ☆22Nov 17, 2021Updated 4 years ago
- ☆25Apr 25, 2024Updated last year
- Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection☆15Dec 19, 2022Updated 3 years ago
- This is the latest version of BinHunter paper☆13Apr 13, 2025Updated 11 months ago
- ☆25Feb 6, 2024Updated 2 years ago
- ☆12Oct 14, 2025Updated 5 months ago
- A tool to help you generate java call graph.☆10Apr 14, 2021Updated 4 years ago
- Source code for ISSTA'24 paper "AI Coders Are Among Us: Rethinking Programming Language Grammar Towards Efficient Code Generation"☆12Oct 21, 2024Updated last year
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆115Aug 9, 2022Updated 3 years ago
- ☆23Nov 10, 2023Updated 2 years ago
- 基于图神经网络的切片级漏洞检测及解释方法☆46Oct 22, 2024Updated last year
- Detects performed refactorings in the changes in Kotlin code☆18Dec 15, 2025Updated 3 months ago
- A static-analysis tool to detect C/C++ vulnerabilities based on graph comparison☆29Feb 26, 2021Updated 5 years ago
- [NeurIPS'25] The official code of "PeRL: Permutation-Enhanced Reinforcement Learning for Interleaved Vision-Language Reasoning"☆30Jan 12, 2026Updated 2 months ago
- Replication Package for "Compressing Pre-trained Models of Code into 3 MB", ASE 2022☆31Oct 10, 2024Updated last year
- Open-source repository for the ISSTA'23 paper "CONCORD: Clone-aware Contrastive Learning for Source Code"☆11Nov 10, 2023Updated 2 years ago
- ☆37Oct 27, 2021Updated 4 years ago
- ☆28Oct 2, 2025Updated 5 months ago
- [ICML2020] "Self-PU: Self Boosted and Calibrated Positive-Unlabeled Training" by Xuxi Chen, Wuyang Chen, Tianlong Chen, Ye Yuan, Chen Gon…☆69Dec 29, 2021Updated 4 years ago