π€ user2code2vec: Embeddings for Profiling Students Based on Distributional Representations of Source Code. Full Paper presented at Learning Analytics & Knowledge 2019 Conference in AZ, USA
β22May 23, 2019Updated 6 years ago
Alternatives and similar repositories for user2code2vec
Users that are interested in user2code2vec are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Open-science code of the program repair tool described in "Dynamic Patch Generation for Null Pointer Exceptions Using Metaprogramming" (β¦β15Feb 12, 2026Updated last month
- Detect semantically similar python code using fine-tuned GraphCodeBERT model.β16Jan 23, 2023Updated 3 years ago
- Static code analysis package for Python repositoriesβ34Nov 25, 2023Updated 2 years ago
- β20Nov 6, 2019Updated 6 years ago
- A fuzzy parser for C/C++ that creates semantic code property graphsβ37Oct 15, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways β’ AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- AVATAR: Fixing Semantic Bugs with Fix Patterns of Static Analysis Violationsβ26Apr 26, 2021Updated 4 years ago
- Ingests and analyzes a code repository.β34Apr 29, 2021Updated 4 years ago
- β15Jan 24, 2023Updated 3 years ago
- β20Feb 20, 2017Updated 9 years ago
- A binary analysis tool for linuxβ71Jun 2, 2020Updated 5 years ago
- A dataset for natural language code search.β14Feb 13, 2020Updated 6 years ago
- Phriky Units - Physical units inconsistency detection tool for C++, especially for ROSβ22Feb 8, 2019Updated 7 years ago
- Learning from what we know: How to perform vulnerability prediction using noisy historical data, Empirical Software Engineering (EMSE)β14Sep 20, 2023Updated 2 years ago
- Tracking events, CfPs, abstracts, slides, and all other even related thingsβ22Oct 4, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Demonstration of the path-extraction process shown in the paper "A General Path-Based Representation for Predicting Program Properties"β24Aug 21, 2021Updated 4 years ago
- C# Data Extraction for "Learning to Represent Edits"β27Nov 3, 2018Updated 7 years ago
- Process mining for non-interactive usageβ13Mar 3, 2018Updated 8 years ago
- A learning-guided approach for executing arbitrary Python code snippetsβ16Mar 4, 2024Updated 2 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.netβ34Mar 4, 2024Updated 2 years ago
- Artifacts and other data for "Code Vectors: Understanding Programs Through Embedded Abstraced Symbolic Traces"β22Jun 5, 2020Updated 5 years ago
- holding data and processing code for the paper 'A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lessoβ¦β20Jul 10, 2020Updated 5 years ago
- Software vulnerabilities data setβ25Mar 4, 2020Updated 6 years ago
- Library for preprocessing java source code into Augmented ASTs, as per the paper Open Vocabulary Learning on Source Code with a Graph-Strβ¦β21Oct 22, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways β’ AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Generating Adversarial Examples for Holding Robustness of Source Code Processing Modelsβ15Dec 2, 2021Updated 4 years ago
- High-level library for executable binary file analysisβ16Feb 13, 2017Updated 9 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attackβ26May 31, 2016Updated 9 years ago
- The SearchRepair automated C program repair tool (see http://people.cs.umass.edu/~brun/pubs/pubs/Ke15ase.pdf)β27Mar 13, 2019Updated 7 years ago
- β19Jun 27, 2021Updated 4 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverageβ31Sep 28, 2018Updated 7 years ago
- Code to reproduce the experiments in the paper Open Vocabulary Learning on Source Code with a Graph-Structured Cacheβ21Apr 15, 2019Updated 6 years ago
- Code for the model presented in the paper: "code2seq: Generating Sequences from Structured Representations of Code"β564Jul 12, 2025Updated 8 months ago
- Some toolsβ10Dec 5, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- go-bssid-geolocatorβ14Mar 19, 2025Updated last year
- β14Feb 2, 2023Updated 3 years ago
- A method for training neural networks that are provably robust to adversarial attacks. [IJCAI 2019]β10Sep 3, 2019Updated 6 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Siβ¦β12May 25, 2016Updated 9 years ago
- A vulnerability patch gathering toolβ44Jan 11, 2019Updated 7 years ago
- [ICSE'18] Hierarchical Learning of Cross-Language Mappings through Distributed Vector Representations for Codeβ22May 18, 2018Updated 7 years ago
- Tool for analyzing git log messages and diffs.β22Jan 13, 2021Updated 5 years ago