A paper list of vulnerability detection using deep learning (updating)
☆14Apr 26, 2024Updated last year
Alternatives and similar repositories for deep_learning_vulnerability_detection
Users that are interested in deep_learning_vulnerability_detection are comparing it to the libraries listed below
Sorting:
- Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Daphne Yao, Na Meng. Example-Based Vulnerability Detection and Repair in Java Code 30th IEEE/AC…☆10Jul 31, 2022Updated 3 years ago
- software defect prediction☆11Jan 2, 2023Updated 3 years ago
- 主要是自己看过的一些论文,同时做了对应的思维导图,以供大家参考学习。☆14May 15, 2022Updated 3 years ago
- Code for the paper(VDoTR: Vulnerability Detection Based on Tensor Representation \\of Comprehensive Code Graphs)☆17Apr 23, 2023Updated 2 years ago
- Revisiting Graph Neural Networks for Vulnerability Detection (ICSE 2022) (Pytorch)☆82Mar 10, 2022Updated 3 years ago
- A deep learning-based vulnerability detection framework☆76Feb 29, 2024Updated 2 years ago
- ☆82Jul 11, 2023Updated 2 years ago
- A backdoor attack by vulnerability amplification on online machine learning-based network intrusion detection system☆22Aug 24, 2021Updated 4 years ago
- ☆29Nov 7, 2022Updated 3 years ago
- This repository contains a PyTorch implementation of the ISSTA'24 paper "Graph Neural Networks for Vulnerability Detection: A Counterfact…☆33Jun 6, 2025Updated 8 months ago
- VulDeePecker algorithm implemented in Python☆113May 8, 2019Updated 6 years ago
- FUNDED is a novel learning framework for building vulnerability detection models.☆129Dec 6, 2023Updated 2 years ago
- 《2021医学健康数据分析与挖掘》课程论文 -- 基于BERT的20NewsGroups数据集新闻分类实验☆10Jun 22, 2021Updated 4 years ago
- Data pre-processing, analysis, visualization, D-reduction, and classification with different model/data -driven optimization techniques☆10Dec 29, 2019Updated 6 years ago
- [TKDE] This repository is the official implementation of the TKDE 2025 "Fuzzy Granule Density-Based Outlier Detection with Multi-Scale Gr…☆16Dec 20, 2025Updated 2 months ago
- ☆11Apr 30, 2021Updated 4 years ago
- Smart Contract Security Vulnerability Detection Method based on Target-guided Symbolic Execution☆13Jul 24, 2022Updated 3 years ago
- VulnerabilityDetectionResearch☆93Mar 22, 2022Updated 3 years ago
- Binary exploitation exercises and scripts☆12Mar 15, 2022Updated 3 years ago
- code for Graph Intelligence Enhanced Bi-Channel Insider Threat Detection paper☆13Aug 30, 2022Updated 3 years ago
- 本项目使用Keras实现Transformer模型来进行文本分类(中文、英文均支持)。☆12Mar 31, 2022Updated 3 years ago
- ☆18Mar 27, 2025Updated 11 months ago
- ☆14Feb 12, 2024Updated 2 years ago
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- Supplementary code and data of the paper Evaluating network embedding techniques' performances in software bug prediction☆11Aug 13, 2021Updated 4 years ago
- FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.☆15Sep 27, 2024Updated last year
- ☆13Aug 18, 2025Updated 6 months ago
- Program Slicing. Experimental library.☆13Feb 2, 2022Updated 4 years ago
- LSTM-based smart contract reentry vulnerability detection.☆10Apr 14, 2019Updated 6 years ago
- My attempt at writing exploit POCs for various CVEs☆16Feb 8, 2020Updated 6 years ago
- ☆12Jun 27, 2025Updated 8 months ago
- For V8CTF M122☆14Aug 25, 2024Updated last year
- 华为认证考试题库☆10Aug 29, 2018Updated 7 years ago
- ☆10Jul 19, 2023Updated 2 years ago
- Software defect prediction (predicting logical errors in source code files) using recurrent neural network and convolutional neural netwo…☆12Oct 16, 2020Updated 5 years ago
- Python script that fetches, analyzes, and reports Microsoft Patch Tuesday updates via the MSRC API — with a clean web interface for easy …☆24Updated this week
- BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection☆10Oct 2, 2020Updated 5 years ago
- ☆15Mar 25, 2017Updated 8 years ago
- ☆14Dec 8, 2022Updated 3 years ago