☆12Aug 9, 2020Updated 5 years ago
Alternatives and similar repositories for Flow2Vec
Users that are interested in Flow2Vec are comparing it to the libraries listed below
Sorting:
- ☆14Jul 21, 2020Updated 5 years ago
- ☆10Jul 19, 2023Updated 2 years ago
- Deep Program Structure Modeling ThroughMulti-Relational Graph-based Learning☆10May 24, 2021Updated 4 years ago
- ☆21May 10, 2022Updated 3 years ago
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆75Jun 24, 2022Updated 3 years ago
- VulnerabilityDetectionResearch☆93Mar 22, 2022Updated 3 years ago
- ☆20Mar 21, 2024Updated last year
- ☆89Feb 1, 2021Updated 5 years ago
- ☆22Nov 17, 2021Updated 4 years ago
- ☆29Oct 29, 2022Updated 3 years ago
- [AAAI 2021] - TreeCaps: Tree-based Capsule Network for Source Code Processing☆23Mar 24, 2023Updated 2 years ago
- A static-analysis tool to detect C/C++ vulnerabilities based on graph comparison☆29Feb 26, 2021Updated 5 years ago
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆72May 27, 2022Updated 3 years ago
- ☆13Oct 11, 2024Updated last year
- Works about detecting vulnerable using ML.☆87May 2, 2020Updated 5 years ago
- [ICSE 2021] - InferCode: Self-Supervised Learning of Code Representations by Predicting Subtrees☆89Aug 8, 2025Updated 6 months ago
- Alleycat plugin by devttys0, ported to IDA 8☆11Jan 15, 2025Updated last year
- 反弹shell管理工具☆11Feb 10, 2020Updated 6 years ago
- 汇集各类字体,包括手写体,韩文等☆11Jan 24, 2024Updated 2 years ago
- 0day-today-archive: Historical collection of exploits and vulnerabilities from 0day.today☆34Sep 22, 2025Updated 5 months ago
- ☆12Jan 28, 2026Updated last month
- Open-source repository for the ISSTA'23 paper "CONCORD: Clone-aware Contrastive Learning for Source Code"☆11Nov 10, 2023Updated 2 years ago
- Code of On L-p Robustness of Decision Stumps and Trees, ICML 2020☆10Aug 3, 2020Updated 5 years ago
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆115Aug 9, 2022Updated 3 years ago
- ☆13Feb 22, 2022Updated 4 years ago
- ☆11Jul 8, 2024Updated last year
- Intelligent Code Analysis by Computer Vision Techniques and Application to Vulnerability Prediction☆10May 10, 2021Updated 4 years ago
- Caputre the flag with Large Language Models☆26Aug 5, 2025Updated 6 months ago
- Code for ICSE'24 Paper☆14Apr 21, 2024Updated last year
- The paper "Deep Graph Level Anomaly Detection with Contrastive Learning" has been accepted by Scientific Reports Journal.☆12Feb 10, 2023Updated 3 years ago
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆16May 17, 2023Updated 2 years ago
- Attention-based multimodal fusion for sentiment analysis☆13Aug 14, 2018Updated 7 years ago
- clfs CVE 的一些 POC 收集☆16Oct 27, 2022Updated 3 years ago
- ☆12Jul 8, 2023Updated 2 years ago
- Software defect prediction (predicting logical errors in source code files) using recurrent neural network and convolutional neural netwo…☆12Oct 16, 2020Updated 5 years ago
- ☆11Feb 13, 2024Updated 2 years ago
- Simplified Source Code Pre-Training for Vulnerability Detection☆115Dec 4, 2025Updated 2 months ago
- ☆45Jun 22, 2022Updated 3 years ago
- A Graph-based Program Representation for Data Flow Analysis and Compiler Optimizations☆320May 22, 2024Updated last year