Revisiting Graph Neural Networks for Vulnerability Detection (ICSE 2022) (Pytorch)
☆83Mar 10, 2022Updated 4 years ago
Alternatives and similar repositories for GNN-ReGVD
Users that are interested in GNN-ReGVD are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆228Jul 25, 2024Updated last year
- ☆89Feb 1, 2021Updated 5 years ago
- Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks☆258Jan 19, 2024Updated 2 years ago
- ☆56Nov 19, 2022Updated 3 years ago
- VulnerabilityDetectionResearch☆94Mar 22, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A deep learning-based vulnerability detection framework☆76Feb 29, 2024Updated 2 years ago
- FUNDED is a novel learning framework for building vulnerability detection models.☆130Dec 6, 2023Updated 2 years ago
- VulDeePecker algorithm implemented in Python☆113May 8, 2019Updated 6 years ago
- ☆350Oct 24, 2024Updated last year
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆117Apr 7, 2026Updated last week
- The WikiHow-based and DeScript-based datasets for the event prediction task (IJCNLP 2017)☆15Mar 1, 2019Updated 7 years ago
- A C/C++ Code Vulnerability Dataset with Code Changes and CVE Summaries☆359Mar 25, 2021Updated 5 years ago
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆77Jun 24, 2022Updated 3 years ago
- A paper list of vulnerability detection using deep learning (updating)☆14Apr 26, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Labeled vulnerable functions statistics analysis and neural network training☆30Jul 25, 2019Updated 6 years ago
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆19Nov 24, 2023Updated 2 years ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38May 10, 2018Updated 7 years ago
- ☆14Mar 1, 2023Updated 3 years ago
- From Random Walks to Transformer for Learning Node Embeddings (ECML-PKDD 2020) (In Pytorch and Tensorflow)☆42Jun 10, 2021Updated 4 years ago
- ☆22Nov 17, 2021Updated 4 years ago
- VulDeePecker: A Deep Learning-Based System for Vulnerability Detection☆349Nov 17, 2020Updated 5 years ago
- Replication package for "Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection", ICSE 2024.☆75Sep 24, 2024Updated last year
- ☆13Feb 29, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆22May 10, 2022Updated 3 years ago
- Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Daphne Yao, Na Meng. Example-Based Vulnerability Detection and Repair in Java Code 30th IEEE/AC…☆10Jul 31, 2022Updated 3 years ago
- Code for ICSE'24 Paper☆14Apr 21, 2024Updated last year
- Code for the paper - Source Code Vulnerability Detection: Combining Code Language Models and Code Property Graph☆98Apr 21, 2024Updated last year
- DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection (RAID 2023) https://surrealyz.github.io/…☆177Oct 23, 2024Updated last year
- An implementation of the ACL 2024 Findings paper "Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tu…☆78Oct 29, 2025Updated 5 months ago
- A Capsule Network-based Model for Learning Node Embeddings (CIKM 2020)☆24Nov 3, 2020Updated 5 years ago
- ☆13May 28, 2023Updated 2 years ago
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆75May 27, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The official repository for the paper "VulScribeR: Exploring RAG-based Vulnerability Augmentation with LLMs".☆24Dec 9, 2025Updated 4 months ago
- The replication package of paper "Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks"☆28Jan 3, 2024Updated 2 years ago
- QuatRE: Relation-Aware Quaternions for Knowledge Graph Embeddings (TheWebConf WWW 2022) (Pytorch)☆38Mar 10, 2022Updated 4 years ago
- A Transformer-based Line-Level Vulnerability Prediction☆167Aug 5, 2024Updated last year
- Cyber Code Intelligence (CyberCI)☆14Dec 25, 2020Updated 5 years ago
- 📖源码安全相关的论文收集(污点分析/符号执行/模糊测试)☆21Oct 23, 2021Updated 4 years ago
- Open-source repository for the ISSTA'23 paper "CONCORD: Clone-aware Contrastive Learning for Source Code"☆11Nov 10, 2023Updated 2 years ago