agisnetwork / agis-engine
☆27Updated 8 months ago
Alternatives and similar repositories for agis-engine:
Users that are interested in agis-engine are comparing it to the libraries listed below
- Seminar 2022☆22Updated last month
- The replication package of paper "Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks"☆23Updated last year
- [ICSE 2024 Industry Challenge Track] Official implementation of "ReposVul: A Repository-Level High-Quality Vulnerability Dataset".☆59Updated 4 months ago
- LLM for solidity smart contract automated program repair☆11Updated last month
- When Less is Enough: Positive-Unlabeled Learning Model for Vulnerability Detection☆12Updated last year
- Repository for PrimeVul Vulnerability Detection Dataset☆135Updated 7 months ago
- Academic Papers about LLM Application on Security☆134Updated 2 months ago
- ☆31Updated last year
- For our ICSE21 paper "CURE: Code-Aware Neural Machine Translation for Automatic Program Repair" by Nan Jiang, Thibaud Lutellier, and Lin …☆56Updated 2 years ago
- ☆15Updated last year
- ☆17Updated 11 months ago
- MegaVul - The largest, high-quality, extensible, continuously updated, C/C++/Java vulnerability dataset☆65Updated 3 months ago
- This is the official code repository for paper "Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code".☆9Updated 8 months ago
- We propose a novel adversarial example generation technique (i.e., CODA) for testing deep code models. Its key idea is to use code differ…☆14Updated last year
- ☆16Updated 9 months ago
- Replication Package for "Natural Attack for Pre-trained Models of Code", ICSE 2022☆46Updated 8 months ago
- The automated prompt injection framework for LLM-integrated applications.☆189Updated 7 months ago
- SeqTrans: Automatic Vulnerability Fix via Sequence to Sequence Learning☆17Updated 3 years ago
- A Transformer-based Line-Level Vulnerability Prediction☆131Updated 8 months ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆62Updated last year
- For our ISSTA23 paper "How Effective are Neural Networks for Fixing Security Vulnerabilities?" by Yi Wu, Nan Jiang, Hung Viet Pham, Thiba…☆36Updated last year
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆44Updated last year
- PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open Source Software (ISSTA 2024)☆19Updated 3 weeks ago
- ☆12Updated 2 years ago
- ☆14Updated last year
- ☆110Updated 9 months ago
- This repository complements our paper by offering the training dataset, the best-performing models utilized in our real-world experiment,…☆18Updated last month
- Source Code Search☆11Updated last year
- ☆23Updated 2 months ago
- We propose a novel DL-based mutation technique (LEAM), which adapts the syntax-guided encoder-decoder architecture to build two sub-model…☆27Updated 10 months ago