A Deep Learning Augmented Large Language Model Prompting Framework for Software Vulnerability Detection
☆22Oct 8, 2024Updated last year
Alternatives and similar repositories for DLAP
Users that are interested in DLAP are comparing it to the libraries listed below
Sorting:
- A deep learning model for identifying and localizing vulnerabilities in C/C++ source code.☆12Jan 18, 2025Updated last year
- ☆18May 27, 2025Updated 9 months ago
- ☆46Mar 7, 2025Updated 11 months ago
- Finetuning large language models (LLMs) for vulnerability detection☆55Apr 2, 2025Updated 11 months ago
- A collection of datasets for machine learning for big code☆62Oct 8, 2021Updated 4 years ago
- A Novel Benchmark evaluating the Deep Capability of Vulnerability Detection with Large Language Models☆33Apr 25, 2025Updated 10 months ago
- Code for AAAI'24 paper "Graph Neural Prompting with Large Language Models".☆34Apr 29, 2025Updated 10 months ago
- A First Look at Conventional Commits Classification☆12Nov 18, 2024Updated last year
- A Transformer-based Line-Level Vulnerability Prediction☆160Aug 5, 2024Updated last year
- Code for the paper - Source Code Vulnerability Detection: Combining Code Language Models and Code Property Graph☆96Apr 21, 2024Updated last year
- SecVulEval is a dataset of C/C++ vulnerabilities.☆18Dec 20, 2025Updated 2 months ago
- ⚡ A seamless integration of HuggingFace Transformers & Diffusers with RBLN SDK for efficient inference on RBLN NPUs.☆15Updated this week
- VulnerabilityDetectionResearch☆93Mar 22, 2022Updated 3 years ago
- Repo for the paper "Bounding Training Data Reconstruction in Private (Deep) Learning".☆11Jun 16, 2023Updated 2 years ago
- ☆12Nov 19, 2025Updated 3 months ago
- This is the implementation of RC4, a software stream cipher.☆10Oct 9, 2019Updated 6 years ago
- Edge-Featured Graph Attention Network (EGAT) implementation for reaction and molecular property prediction☆12Feb 12, 2024Updated 2 years ago
- Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Daphne Yao, Na Meng. Example-Based Vulnerability Detection and Repair in Java Code 30th IEEE/AC…☆10Jul 31, 2022Updated 3 years ago
- ☆12Aug 9, 2023Updated 2 years ago
- Dahua NVR command line tool☆11Sep 8, 2020Updated 5 years ago
- Repository for PrimeVul Vulnerability Detection Dataset☆221Sep 7, 2024Updated last year
- ☆13Mar 22, 2024Updated last year
- ☆11Jun 5, 2015Updated 10 years ago
- Code for "Message Scheduling for Performant, Many-Core Belief Propagation"☆12Oct 25, 2019Updated 6 years ago
- Ongoing project: a library for graph foundation model☆13Feb 7, 2024Updated 2 years ago
- An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines, technical resource…☆14Feb 7, 2022Updated 4 years ago
- ☆15May 22, 2023Updated 2 years ago
- Binary dynamic, static, and symbolic execution analysis tools for directed test generation☆22Nov 14, 2019Updated 6 years ago
- LLM4DV☆16Sep 30, 2024Updated last year
- Benchmark workloads of Boki☆11Sep 8, 2021Updated 4 years ago
- ☆15Aug 26, 2023Updated 2 years ago
- ☆15May 6, 2022Updated 3 years ago
- ☆16Nov 24, 2023Updated 2 years ago
- ☆49Jul 24, 2022Updated 3 years ago
- ☆14Mar 1, 2023Updated 3 years ago
- ☆14May 28, 2024Updated last year
- LLM for System/Software Security☆23Dec 29, 2024Updated last year
- ☆14May 14, 2024Updated last year
- Symbolic Execution of Android Framework☆15Jun 25, 2017Updated 8 years ago