BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection
☆10Oct 2, 2020Updated 5 years ago
Alternatives and similar repositories for BGNN4VD
Users that are interested in BGNN4VD are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Oct 14, 2025Updated 5 months ago
- ☆23Nov 10, 2023Updated 2 years ago
- Supplementary code and data of the paper Evaluating network embedding techniques' performances in software bug prediction☆11Aug 13, 2021Updated 4 years ago
- ESEC/FSE'21: Prediction-Preserving Program Simplification☆10Oct 4, 2022Updated 3 years ago
- Software defect prediction (predicting logical errors in source code files) using recurrent neural network and convolutional neural netwo…☆12Oct 16, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆15Jan 17, 2024Updated 2 years ago
- Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Daphne Yao, Na Meng. Example-Based Vulnerability Detection and Repair in Java Code 30th IEEE/AC…☆10Jul 31, 2022Updated 3 years ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Oct 18, 2022Updated 3 years ago
- software defect prediction☆11Jan 2, 2023Updated 3 years ago
- ☆10Feb 8, 2015Updated 11 years ago
- [ISSTA 2024] PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open Source Software☆27Sep 13, 2025Updated 6 months ago
- MiDas: Multi-granularity Detector for Vulnerability Fixes (IEEE TSE)☆15Dec 5, 2023Updated 2 years ago
- Vulnerable code clone detection technique. Published in EuroS&P2020☆10Sep 4, 2020Updated 5 years ago
- VulDeePecker: A Deep Learning-Based System for Vulnerability Detection☆347Nov 17, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆50Jan 19, 2019Updated 7 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 4 years ago
- ☆10Sep 24, 2019Updated 6 years ago
- Cyber Code Intelligence (CyberCI)☆14Dec 25, 2020Updated 5 years ago
- ☆22Nov 17, 2021Updated 4 years ago
- FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.☆16Sep 27, 2024Updated last year
- Ethereum ERC-20 Test Standard Token (TST)☆10Mar 14, 2025Updated last year
- VulDeePecker algorithm implemented in Python☆113May 8, 2019Updated 6 years ago
- FUNDED is a novel learning framework for building vulnerability detection models.☆129Dec 6, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A LEO Constellation Emulator for Security Experimentation☆20Mar 2, 2023Updated 3 years ago
- ☆16May 29, 2022Updated 3 years ago
- ☆14May 28, 2024Updated last year
- Java deserialization examples☆13Feb 6, 2019Updated 7 years ago
- ☆350Oct 24, 2024Updated last year
- ☆12Oct 5, 2022Updated 3 years ago
- ☆32Jan 14, 2025Updated last year
- ☆11Jul 8, 2024Updated last year
- Fork from https://github.com/joxeankoret/mynav, works with IDA 7.0☆12Jan 24, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Software defect prediction using ensemble learning☆23Nov 29, 2017Updated 8 years ago
- ☆18Mar 18, 2024Updated 2 years ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Apr 21, 2020Updated 5 years ago
- WAF Environment for OpenAI Gym☆15Dec 13, 2020Updated 5 years ago
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- ML models often mispredict, and it is hard to tell when and why. We present a data mining based approach to discover whether there is a c…☆17Jun 6, 2022Updated 3 years ago
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆17Feb 6, 2025Updated last year