A deep learning model for identifying and localizing vulnerabilities in C/C++ source code.
☆12Jan 18, 2025Updated last year
Alternatives and similar repositories for FVD-DPM
Users that are interested in FVD-DPM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14May 14, 2024Updated last year
- The replication package of paper "Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks"☆28Jan 3, 2024Updated 2 years ago
- This is the repository for the paper titled "ThinkRepair: Self-Directed Automated Program Repair" accepted by ISSTA'24.☆32Jan 10, 2026Updated 3 months ago
- ☆22Apr 21, 2023Updated 2 years ago
- A Deep Learning Augmented Large Language Model Prompting Framework for Software Vulnerability Detection☆23Oct 8, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- This is the tool released in ICSE 2024 paper "Domain Knowledge Matters: Improving Prompts with Fix Templates for Repairing Python Type Er…☆17Jun 5, 2023Updated 2 years ago
- 量子计算大作业,模拟 Shor 算法☆13Jun 19, 2022Updated 3 years ago
- Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Daphne Yao, Na Meng. Example-Based Vulnerability Detection and Repair in Java Code 30th IEEE/AC…☆10Jul 31, 2022Updated 3 years ago
- A deep learning model for localizing bugs in C/C++ source code (USENIX'23)☆159Jun 28, 2023Updated 2 years ago
- Vision Transformer-Inspired Automated Vulnerability Repair☆19May 13, 2025Updated 11 months ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- LLM for System/Software Security☆24Dec 29, 2024Updated last year
- For our ISSTA23 paper "How Effective are Neural Networks for Fixing Security Vulnerabilities?" by Yi Wu, Nan Jiang, Hung Viet Pham, Thiba…☆41Nov 13, 2023Updated 2 years ago
- ☆12Aug 9, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆16Nov 24, 2023Updated 2 years ago
- ☆16Aug 26, 2023Updated 2 years ago
- POC implementation of "Accelerating HE Operations Using Key Decomposition"[KLSS23]☆19Jun 11, 2025Updated 10 months ago
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆77Jun 24, 2022Updated 3 years ago
- ☆15May 6, 2022Updated 3 years ago
- DeVAIC (Detection of Vulnerabilities in AI-generated Code) is a static code analyzer for security issues in Python code snippets. It dete…☆17Oct 24, 2025Updated 5 months ago
- The repository of "DeepFD: Automated Fault Diagnosis and Localization for Deep Learning Programs"☆18Oct 12, 2022Updated 3 years ago
- Mininode is a CLI tool to reduce the attack surface of the Node.js applications by using static analysis.☆21Apr 11, 2023Updated 3 years ago
- Do You Know What's In Your Python Packages? A Tool for Visualizing Python Package Registry Security Audit Data☆19Jun 13, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- VulRepair: A T5-Based Automated Software Vulnerability Repair☆84May 13, 2025Updated 11 months ago
- CleanVul: Automatic Function-Level Vulnerability Detection in Code Commits Using LLM Heuristics☆20Mar 25, 2026Updated 2 weeks ago
- chat backend with GPT3/chatGPT and multilingual VITS, and multilingual speech input supported☆12Apr 5, 2023Updated 3 years ago
- The official repository of ICSME'23 paper "Exploring Security Commits in Python"☆18Jul 12, 2023Updated 2 years ago
- ☆15Jan 15, 2023Updated 3 years ago
- ☆20Jun 29, 2024Updated last year
- [NeurIPS 2023] The official implementation of "Rethinking Semi-Supervised Imbalanced Node Classification from Bias-Variance Decomposition…☆12Oct 25, 2025Updated 5 months ago
- Mining Relevant Fix Patterns for Automated Program Repair☆31Dec 14, 2022Updated 3 years ago
- Some test samples for CPG execution logic.☆20Apr 13, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆19May 27, 2025Updated 10 months ago
- Code for the paper - Source Code Vulnerability Detection: Combining Code Language Models and Code Property Graph☆98Apr 21, 2024Updated last year
- Repo for the paper "Bounding Training Data Reconstruction in Private (Deep) Learning".☆11Jun 16, 2023Updated 2 years ago
- [ICSE'24 Industry Challenge Track] "ReposVul: A Repository-Level High-Quality Vulnerability Dataset".☆99Nov 24, 2024Updated last year
- An implementation of RC4, a software stream cipher.☆10Oct 9, 2019Updated 6 years ago
- This repo is for our submission for ICSE 2025.☆20Jun 12, 2024Updated last year
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆19Nov 24, 2023Updated 2 years ago