☆16Nov 20, 2022Updated 3 years ago
Alternatives and similar repositories for deepvd2022
Users that are interested in deepvd2022 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [ASE'23] When Less is Enough: Positive-Unlabeled Learning Model for Vulnerability Detection☆16Jan 12, 2024Updated 2 years ago
- ☆14Mar 1, 2023Updated 3 years ago
- Learning Program Semantics for Vulnerability Detection via Vulnerability-specific Inter-procedural Slicing☆14Aug 21, 2023Updated 2 years ago
- ☆16Aug 16, 2023Updated 2 years ago
- Code for ICSE'24 Paper☆14Apr 21, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆13May 28, 2023Updated 2 years ago
- ☆22Mar 21, 2024Updated 2 years ago
- VulnerabilityDetectionResearch☆94Mar 22, 2022Updated 4 years ago
- Replication package for "Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection", ICSE 2024.☆75Sep 24, 2024Updated last year
- ☆22May 10, 2022Updated 3 years ago
- ☆16Jan 17, 2024Updated 2 years ago
- ☆23Nov 10, 2023Updated 2 years ago
- ☆16Aug 26, 2023Updated 2 years ago
- ☆11May 14, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆56Nov 19, 2022Updated 3 years ago
- A tool based on python to parse C/C++ code into code property graph☆17Nov 4, 2022Updated 3 years ago
- CONCOCTION is an automated machine learning-based vulnerability detection framework that combines static source code information and dyna…☆27Aug 18, 2024Updated last year
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆19Nov 24, 2023Updated 2 years ago
- Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection☆15Dec 19, 2022Updated 3 years ago
- ☆26Apr 25, 2024Updated 2 years ago
- Replication Package for "Compressing Pre-trained Models of Code into 3 MB", ASE 2022☆30Oct 10, 2024Updated last year
- The replication package of paper "Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks"☆28Jan 3, 2024Updated 2 years ago
- ☆16Nov 24, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This repository contains a PyTorch implementation of the ISSTA'24 paper "Graph Neural Networks for Vulnerability Detection: A Counterfact…☆34Jun 6, 2025Updated 10 months ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38May 10, 2018Updated 7 years ago
- ☆83Jul 11, 2023Updated 2 years ago
- 基于图神经网络的切片级漏洞检测及解释方法☆46Oct 22, 2024Updated last year
- Repository for PrimeVul Vulnerability Detection Dataset☆236Sep 7, 2024Updated last year
- ☆49Mar 7, 2025Updated last year
- Fixing SySeVR.☆12Sep 23, 2021Updated 4 years ago
- A Transformer-based Line-Level Vulnerability Prediction☆171Aug 5, 2024Updated last year
- ☆37Oct 27, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Multi-granularity vulnerability detection with a novel pre-trained code model☆19Dec 15, 2025Updated 4 months ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆42Dec 29, 2023Updated 2 years ago
- A Security Operation Tool Based on Large Language Models 基于大语言模型的安全运营工具☆23Mar 20, 2024Updated 2 years ago
- The official codes for our paper at COLING 2022: Semantic-Preserving Adversarial Code Comprehension☆12Oct 23, 2022Updated 3 years ago
- Large Language Models for Software Engineering: A Systematic Literature Review☆20Sep 19, 2024Updated last year
- Program Slicing. Experimental library.☆13Feb 2, 2022Updated 4 years ago
- This repository offers a detailed taxonomy of existing AI-driven security solutions tailored for DevSecOps, highlighting the current rese…☆20Jul 2, 2025Updated 10 months ago