chenpp1881 / ClearLinks
☆20Updated last year
Alternatives and similar repositories for Clear
Users that are interested in Clear are comparing it to the libraries listed below
Sorting:
- ☆42Updated 3 years ago
- MANDO is a new heterogeneous graph representation to learn the heterogeneous contract graphs' structures to accurately detect vulnerabili…☆32Updated last year
- ☆13Updated 2 years ago
- This is the dataset for our TSE paper "Defining Smart Contracts Defects on Ethereum"☆17Updated 6 months ago
- Cross-Modality Mutual Learning for Smart Contract Vulnerability Detection☆33Updated 2 years ago
- ☆22Updated 2 years ago
- ☆49Updated 2 years ago
- Combining Graph Neural Networks with Expert Knowledge for Smart Contract Vulnerability Detection (TKDE Accepted)☆117Updated 2 years ago
- A project to automatically generate program repair recommendation in the field of smart contracts for given code snippets with their cont…☆15Updated 4 months ago
- ☆26Updated 2 years ago
- The replication package of paper "Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks"☆24Updated last year
- ReChecker: Towards Automated Reentrancy Detection for Smart Contracts Based on Sequential Models☆55Updated 4 years ago
- Smart Contract Vulnerability Detection From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion (IJCAI-21 Accept…☆93Updated 2 years ago
- ☆84Updated 4 years ago
- VulnerabilityDetectionResearch☆89Updated 3 years ago
- When Less is Enough: Positive-Unlabeled Learning Model for Vulnerability Detection☆13Updated last year
- ☆74Updated 2 years ago
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆17Updated last year
- ☆12Updated 2 years ago
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆110Updated 2 years ago
- Code for ICSE'24 Paper☆10Updated last year
- “CBGRU: A Detection method of Smart Contract Vulnerability Based on Hybrid Model”☆11Updated 3 years ago
- Smart Contract Vulnerability Detection Based on Deep Learning. (LSTM, BLSTM, BLSTM+Attention)☆28Updated 6 years ago
- Code for the paper - Source Code Vulnerability Detection: Combining Code Language Models and Code Property Graph☆76Updated last year
- ☆211Updated 11 months ago
- Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks☆227Updated last year
- ☆13Updated last year
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆74Updated 3 years ago
- A Transformer-based Line-Level Vulnerability Prediction☆142Updated 11 months ago
- ☆9Updated last year