Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection
☆15Dec 19, 2022Updated 3 years ago
Alternatives and similar repositories for MAGNET
Users that are interested in MAGNET are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13May 28, 2023Updated 2 years ago
- The official codes for our paper at COLING 2022: Semantic-Preserving Adversarial Code Comprehension☆12Oct 23, 2022Updated 3 years ago
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆19Nov 24, 2023Updated 2 years ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆42Dec 29, 2023Updated 2 years ago
- ☆23Nov 10, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆20Jun 17, 2024Updated last year
- Learning Program Semantics for Vulnerability Detection via Vulnerability-specific Inter-procedural Slicing☆14Aug 21, 2023Updated 2 years ago
- Fixing SySeVR.☆12Sep 23, 2021Updated 4 years ago
- ☆15May 22, 2023Updated 2 years ago
- ☆10Apr 15, 2023Updated 2 years ago
- Replication package for "Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection", ICSE 2024.☆75Sep 24, 2024Updated last year
- ☆11May 14, 2024Updated last year
- ☆56Nov 19, 2022Updated 3 years ago
- ☆16Nov 24, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆22May 10, 2022Updated 3 years ago
- ☆14Mar 1, 2023Updated 3 years ago
- ☆13Feb 29, 2024Updated 2 years ago
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆77Jun 24, 2022Updated 3 years ago
- ☆16Jan 17, 2024Updated 2 years ago
- ☆16Aug 16, 2023Updated 2 years ago
- Code for ICSE'24 Paper☆14Apr 21, 2024Updated last year
- A deep learning-based vulnerability detection framework☆76Feb 29, 2024Updated 2 years ago
- ☆17May 23, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆16May 17, 2023Updated 2 years ago
- An implementation of the ACL 2024 Findings paper "Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tu…☆76Oct 29, 2025Updated 5 months ago
- ☆25Apr 25, 2024Updated last year
- ☆16Nov 20, 2022Updated 3 years ago
- Smart Contract Vulnerability Detection Based on Deep Learning. (LSTM, BLSTM, BLSTM+Attention)☆29Jul 14, 2019Updated 6 years ago
- ☆89Feb 1, 2021Updated 5 years ago
- [ASE'23] When Less is Enough: Positive-Unlabeled Learning Model for Vulnerability Detection☆16Jan 12, 2024Updated 2 years ago
- DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection (RAID 2023) https://surrealyz.github.io/…☆176Oct 23, 2024Updated last year
- a generic decompiler testing framework that can automatically vet the decompilation correctness on the function level.☆18Sep 12, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications☆18May 10, 2024Updated last year
- 本项目使用Keras实现Transformer模型来进行文本分类(中文、英文均支持)。☆12Mar 31, 2022Updated 4 years ago
- Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks☆257Jan 19, 2024Updated 2 years ago
- Cross-Modality Mutual Learning for Smart Contract Vulnerability Detection☆34Feb 28, 2023Updated 3 years ago
- Smart Contract Security Vulnerability Detection Method based on Target-guided Symbolic Execution☆13Jul 24, 2022Updated 3 years ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆44Jun 29, 2022Updated 3 years ago
- Open-source repository for the ISSTA'23 paper "CONCORD: Clone-aware Contrastive Learning for Source Code"☆11Nov 10, 2023Updated 2 years ago