codingClaire / Structural-Code-UnderstandingLinks
A Survey of Deep Learning Models for Structural Code Understanding
☆21Updated 3 years ago
Alternatives and similar repositories for Structural-Code-Understanding
Users that are interested in Structural-Code-Understanding are comparing it to the libraries listed below
Sorting:
- ☆33Updated 3 years ago
- [ICSE 2021] - InferCode: Self-Supervised Learning of Code Representations by Predicting Subtrees☆89Updated 3 weeks ago
- Revisiting Graph Neural Networks for Vulnerability Detection (ICSE 2022) (Pytorch)☆72Updated 3 years ago
- ☆22Updated 3 years ago
- Code and data for paper "Detecting Code Clones with Graph Neural Network and Flow-Augmented Abstract Syntax Tree".☆67Updated 3 years ago
- ☆49Updated 2 years ago
- ☆29Updated 4 years ago
- ☆76Updated 2 years ago
- ☆24Updated last year
- ☆39Updated 2 years ago
- ☆14Updated 3 years ago
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆73Updated 3 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆36Updated 3 years ago
- ☆85Updated 4 years ago
- Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks☆233Updated last year
- [FSE 2019] Learning Cross-Language API Mappings with Little Knowledge☆19Updated 2 years ago
- ☆14Updated last year
- ☆45Updated 3 years ago
- Maximal Divergence Sequential Autoencoder for Binary Software Vulnerability Detection☆21Updated 6 years ago
- Learning Semantic Program Embeddings with Graph Interval Neural Network☆14Updated 2 years ago
- This repo illustrates how to evaluate the artifacts in the paper Deep Just-in-Time Defect Prediction: How Far Are We? published in ISSTA'…☆37Updated last year
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38Updated 7 years ago
- CLCDSA: Cross Language Code Clone Detection using Syntactical Features and API Documentation☆22Updated 2 months ago
- ☆22Updated 3 years ago
- We propose a novel adversarial example generation technique (i.e., CODA) for testing deep code models. Its key idea is to use code differ…☆15Updated last year
- ☆21Updated 5 years ago
- Data-Driven Software Vulnerability Discovery (SVD)☆13Updated 5 years ago
- ☆49Updated 2 years ago
- VulnerabilityDetectionResearch☆89Updated 3 years ago
- Functional clone detection(currently maintained version)☆34Updated 2 years ago