☆15May 22, 2023Updated 2 years ago
Alternatives and similar repositories for TrVD
Users that are interested in TrVD are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Feb 29, 2024Updated 2 years ago
- VulnerabilityDetectionResearch☆94Mar 22, 2022Updated 4 years ago
- Code for ICSE'24 Paper☆14Apr 21, 2024Updated last year
- A tool based on python to parse C/C++ code into code property graph☆17Nov 4, 2022Updated 3 years ago
- make requests to apples bssid database☆13May 27, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection☆15Dec 19, 2022Updated 3 years ago
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆19Nov 24, 2023Updated 2 years ago
- Starlink gRPC for Golang☆15Apr 6, 2026Updated last week
- ☆63Oct 17, 2023Updated 2 years ago
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆77Jun 24, 2022Updated 3 years ago
- Tree-LSTM + Self-Structured Attention -- a method to summarize textual data by topics☆10Apr 26, 2018Updated 7 years ago
- SecVulEval is a dataset of C/C++ vulnerabilities.☆19Mar 29, 2026Updated 2 weeks ago
- ☆11Jul 14, 2024Updated last year
- ☆10Dec 9, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- 基于SSM的在线资源学习平台☆19Mar 24, 2019Updated 7 years ago
- ☆11Jun 14, 2024Updated last year
- 基于图神经网络的切片级漏洞检测及解释方法☆46Oct 22, 2024Updated last year
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆117Updated this week
- code for "Implant Global and Local Hierarchy Information to Sequence based Code Representation Models"☆12Dec 13, 2024Updated last year
- ☆18Mar 18, 2024Updated 2 years ago
- Fork from https://github.com/joxeankoret/mynav, works with IDA 7.0☆12Jan 24, 2018Updated 8 years ago
- The official codes for our paper at COLING 2022: Semantic-Preserving Adversarial Code Comprehension☆12Oct 23, 2022Updated 3 years ago
- Launch an Ethereum sandbox from the command line☆13Jun 5, 2017Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆13Jul 6, 2023Updated 2 years ago
- Evaluation Results for the Paper "EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts"☆13May 28, 2021Updated 4 years ago
- MANDO is a new heterogeneous graph representation to learn the heterogeneous contract graphs' structures to accurately detect vulnerabili…☆36Nov 24, 2023Updated 2 years ago
- ☆14Mar 1, 2023Updated 3 years ago
- An implementation of the ACL 2024 Findings paper "Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tu…☆76Oct 29, 2025Updated 5 months ago
- ☆20Aug 23, 2024Updated last year
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆16May 17, 2023Updated 2 years ago
- ☆48Mar 7, 2025Updated last year
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38May 10, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Implementation of SATA Tree-LSTM (Dynamic Compositionality in Recursive Neural Networks with Structure-aware Tag Representations, AAAI 20…☆10Jun 21, 2022Updated 3 years ago
- A C/C++ Code Vulnerability Dataset with Code Changes and CVE Summaries☆358Mar 25, 2021Updated 5 years ago
- This is the code for the paper published in IEEE Cloud Computing 2022☆12Jul 22, 2022Updated 3 years ago
- ☆56Nov 19, 2022Updated 3 years ago
- ☆10Apr 15, 2023Updated 2 years ago
- Multi-granularity vulnerability detection with a novel pre-trained code model☆19Dec 15, 2025Updated 3 months ago
- ☆11May 14, 2024Updated last year