ZJU-CTAG / PDBERT
The replication package of paper "Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks"
☆16Updated 10 months ago
Related projects ⓘ
Alternatives and complementary repositories for PDBERT
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆14Updated 11 months ago
- ☆11Updated last year
- VulnerabilityDetectionResearch☆76Updated 2 years ago
- ☆22Updated 2 years ago
- ☆12Updated last year
- ☆11Updated 2 years ago
- ☆9Updated last year
- ☆35Updated 2 years ago
- ☆76Updated 3 years ago
- MegaVul - The largest, high-quality, extensible, continuously updated, C/C++/Java vulnerability dataset☆52Updated 2 weeks ago
- ☆23Updated 2 years ago
- Replication package for "Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection", ICSE 2024.☆47Updated last month
- ☆66Updated last year
- When Less is Enough: Positive-Unlabeled Learning Model for Vulnerability Detection☆11Updated 10 months ago
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆89Updated 2 years ago
- ☆9Updated last year
- ☆21Updated 3 years ago
- [ICSE 2024 Industry Challenge Track] Official implementation of "ReposVul: A Repository-Level High-Quality Vulnerability Dataset".☆45Updated last month
- ☆13Updated 10 months ago
- A Transformer-based Line-Level Vulnerability Prediction☆111Updated 3 months ago
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆69Updated 2 years ago
- ☆20Updated last year
- Labeled vulnerable functions statistics analysis and neural network training☆25Updated 5 years ago
- Code for the paper - Source Code Vulnerability Detection: Combining Code Language Models and Code Property Graph☆41Updated 7 months ago
- This repository contains a PyTorch implementation of the paper "Graph Neural Networks for Vulnerability Detection - A Counterfactual Expl…☆25Updated 7 months ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆27Updated 10 months ago
- CD-VulD based on DR and TL☆7Updated 6 years ago
- ☆13Updated 6 months ago
- A paper list of vulnerability detection using deep learning (updating)☆13Updated 6 months ago
- ☆11Updated 8 months ago