artifact4oopsla20 / Flow2VecLinks
☆12Updated 4 years ago
Alternatives and similar repositories for Flow2Vec
Users that are interested in Flow2Vec are comparing it to the libraries listed below
Sorting:
- ☆22Updated 3 years ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38Updated 7 years ago
- A static-analysis tool to detect C/C++ vulnerabilities based on graph comparison☆27Updated 4 years ago
- ☆22Updated 3 years ago
- Data-Driven Software Vulnerability Discovery (SVD)☆13Updated 5 years ago
- ☆46Updated 6 years ago
- ☆83Updated 4 years ago
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆73Updated 2 years ago
- ☆46Updated 2 years ago
- [ICSE 2021] - InferCode: Self-Supervised Learning of Code Representations by Predicting Subtrees☆90Updated 3 years ago
- Learning graph-based code representations for source-level functional similarity detection. ICSE'23☆49Updated 2 years ago
- BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection☆9Updated 4 years ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆64Updated last year
- VulnerabilityDetectionResearch☆86Updated 3 years ago
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆107Updated 2 years ago
- A deep learning-based vulnerability detection framework☆76Updated last year
- ☆100Updated 7 months ago
- ☆74Updated last year
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆72Updated 3 years ago
- ☆47Updated 2 years ago
- ☆33Updated 2 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆44Updated last year
- Maximal Divergence Sequential Autoencoder for Binary Software Vulnerability Detection☆21Updated 6 years ago
- Labeled vulnerable functions statistics analysis and neural network training☆26Updated 5 years ago
- FUNDED is a novel learning framework for building vulnerability detection models.☆130Updated last year
- Introducing CFG(control flow graph) and PDG (program dependency graph) into AST (abstract syntax tree) implementation using Java Paser an…☆24Updated 6 years ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆34Updated last year
- Code for ICSE'24 Paper☆10Updated last year
- ☆14Updated 3 years ago
- Functional clone detection(currently maintained version)☆34Updated 2 years ago