Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection
☆15Dec 19, 2022Updated 3 years ago
Alternatives and similar repositories for MAGNET
Users that are interested in MAGNET are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13May 28, 2023Updated 2 years ago
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆19Nov 24, 2023Updated 2 years ago
- ☆23Nov 10, 2023Updated 2 years ago
- Learning Program Semantics for Vulnerability Detection via Vulnerability-specific Inter-procedural Slicing☆14Aug 21, 2023Updated 2 years ago
- ☆15May 22, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Fixing SySeVR.☆12Sep 23, 2021Updated 4 years ago
- ☆10Apr 15, 2023Updated 3 years ago
- Replication package for "Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection", ICSE 2024.☆75Sep 24, 2024Updated last year
- ☆11May 14, 2024Updated last year
- ☆56Nov 19, 2022Updated 3 years ago
- ☆16Nov 24, 2023Updated 2 years ago
- ☆22May 10, 2022Updated 3 years ago
- ☆14Mar 1, 2023Updated 3 years ago
- ☆13Feb 29, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A tool based on python to parse C/C++ code into code property graph☆17Nov 4, 2022Updated 3 years ago
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆77Jun 24, 2022Updated 3 years ago
- ☆16Jan 17, 2024Updated 2 years ago
- ☆16Aug 16, 2023Updated 2 years ago
- Code for ICSE'24 Paper☆14Apr 21, 2024Updated 2 years ago
- A deep learning-based vulnerability detection framework☆76Feb 29, 2024Updated 2 years ago
- ☆17May 23, 2023Updated 2 years ago
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆16May 17, 2023Updated 2 years ago
- An implementation of the ACL 2024 Findings paper "Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tu…☆78Oct 29, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆16Nov 20, 2022Updated 3 years ago
- ☆26Apr 25, 2024Updated 2 years ago
- Smart Contract Vulnerability Detection Based on Deep Learning. (LSTM, BLSTM, BLSTM+Attention)☆31Jul 14, 2019Updated 6 years ago
- ☆89Feb 1, 2021Updated 5 years ago
- [ASE'23] When Less is Enough: Positive-Unlabeled Learning Model for Vulnerability Detection☆16Jan 12, 2024Updated 2 years ago
- DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection (RAID 2023) https://surrealyz.github.io/…☆179Oct 23, 2024Updated last year
- a generic decompiler testing framework that can automatically vet the decompilation correctness on the function level.☆19Sep 12, 2024Updated last year
- IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications☆18May 10, 2024Updated last year
- ☆27Sep 21, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆10Dec 9, 2024Updated last year
- 本项目使用Keras实现Transformer模型来进行文本分类(中文、英文均支持)。☆12Mar 31, 2022Updated 4 years ago
- Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks☆258Jan 19, 2024Updated 2 years ago
- Cross-Modality Mutual Learning for Smart Contract Vulnerability Detection☆34Feb 28, 2023Updated 3 years ago
- Smart Contract Security Vulnerability Detection Method based on Target-guided Symbolic Execution☆13Jul 24, 2022Updated 3 years ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆44Jun 29, 2022Updated 3 years ago
- Open-source repository for the ISSTA'23 paper "CONCORD: Clone-aware Contrastive Learning for Source Code"☆11Nov 10, 2023Updated 2 years ago