☆10Dec 9, 2024Updated last year
Alternatives and similar repositories for code2graph
Users that are interested in code2graph are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Feb 29, 2024Updated 2 years ago
- The official codes for our paper at COLING 2022: Semantic-Preserving Adversarial Code Comprehension☆12Oct 23, 2022Updated 3 years ago
- [ASE2024] Mutual Learning-Based Framework for Enhancing Robustness of Code Models via Adversarial Training☆11Sep 13, 2024Updated last year
- ☆37Oct 27, 2021Updated 4 years ago
- A PyTorch implementation of Proxy Anchor Loss based on CVPR 2020 paper "Proxy Anchor Loss for Deep Metric Learning"☆11Jan 16, 2021Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- SecVulEval is a dataset of C/C++ vulnerabilities.☆19Mar 29, 2026Updated 2 weeks ago
- VulnerabilityDetectionResearch☆94Mar 22, 2022Updated 4 years ago
- Implementing SDN based VANET simulated on Mininet-Wifi nodes - Socket programming to implement functionality as an application☆10Feb 22, 2019Updated 7 years ago
- Backdooring Neural Code Search☆14Sep 8, 2023Updated 2 years ago
- ☆11Jun 14, 2024Updated last year
- An implementation of DetNet with Keras.☆10Nov 20, 2018Updated 7 years ago
- ☆13May 28, 2023Updated 2 years ago
- An implementation of the ACL 2024 Findings paper "Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tu…☆76Oct 29, 2025Updated 5 months ago
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆19Sep 12, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆15May 22, 2023Updated 2 years ago
- ☆10Dec 18, 2022Updated 3 years ago
- Code for ICSE'24 Paper☆14Apr 21, 2024Updated last year
- ☆18Mar 18, 2024Updated 2 years ago
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆17Mar 30, 2024Updated 2 years ago
- Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection☆15Dec 19, 2022Updated 3 years ago
- A software defined network inside VANETs concepts using Mininet-WiFi, SUMO and Python. We called it SDVANETS.☆16Jun 22, 2022Updated 3 years ago
- ☆17May 23, 2023Updated 2 years ago
- 图像检索常用数据库☆21Aug 28, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- 计算机图形学大作业☆13Nov 23, 2020Updated 5 years ago
- 适用于深澜4K校园网的轻量化自动登录脚本。北航校园网验证通过。☆12Jun 17, 2025Updated 9 months ago
- TSED with Flexible Parser☆19Jan 22, 2026Updated 2 months ago
- CC: Causality-Aware Coverage Criterion for Deep Neural Networks☆12Feb 15, 2023Updated 3 years ago
- 收集新客户,同时维护老客户.使用成本低并且逼格满满的邮箱营销软件.☆25Feb 7, 2025Updated last year
- ☆16Aug 16, 2023Updated 2 years ago
- 🔍 code quality scanner for the AI-generated code era☆32Feb 8, 2026Updated 2 months ago
- Multi-granularity vulnerability detection with a novel pre-trained code model☆19Dec 15, 2025Updated 3 months ago
- ☆13Sep 22, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Replication package for "Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection", ICSE 2024.☆75Sep 24, 2024Updated last year
- Learning Program Semantics for Vulnerability Detection via Vulnerability-specific Inter-procedural Slicing☆14Aug 21, 2023Updated 2 years ago
- A transformer-based VS Code extension that enables one to discover vulnerabilities in Java files.☆12Dec 1, 2022Updated 3 years ago
- Source Code for ICML 2022 paper "Boosting Graph Structure Learning with Dummy Nodes"☆19Apr 24, 2023Updated 2 years ago
- dstar algorithm implemented by python☆13Dec 25, 2017Updated 8 years ago
- 主要是自己看过的一些论文,同时做了对应的思维导图,以供大家参考学习。☆14May 15, 2022Updated 3 years ago
- 华中科技大学网络安全课程设计-Linux下的状态检测防火墙☆11Oct 17, 2022Updated 3 years ago