☆16Nov 20, 2022Updated 3 years ago
Alternatives and similar repositories for deepvd2022
Users that are interested in deepvd2022 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [ASE'23] When Less is Enough: Positive-Unlabeled Learning Model for Vulnerability Detection☆16Jan 12, 2024Updated 2 years ago
- ☆14Mar 1, 2023Updated 3 years ago
- Code for ICSE'24 Paper☆14Apr 21, 2024Updated last year
- Learning Program Semantics for Vulnerability Detection via Vulnerability-specific Inter-procedural Slicing☆14Aug 21, 2023Updated 2 years ago
- ☆16Aug 16, 2023Updated 2 years ago
- ☆13May 28, 2023Updated 2 years ago
- VulnerabilityDetectionResearch☆94Mar 22, 2022Updated 4 years ago
- Replication package for "Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection", ICSE 2024.☆74Sep 24, 2024Updated last year
- ☆21May 10, 2022Updated 3 years ago
- ☆15Jan 17, 2024Updated 2 years ago
- ☆23Nov 10, 2023Updated 2 years ago
- ☆16Aug 26, 2023Updated 2 years ago
- ☆54Nov 19, 2022Updated 3 years ago
- ☆13Feb 29, 2024Updated 2 years ago
- A tool based on python to parse C/C++ code into code property graph☆17Nov 4, 2022Updated 3 years ago
- CONCOCTION is an automated machine learning-based vulnerability detection framework that combines static source code information and dyna…☆27Aug 18, 2024Updated last year
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆19Nov 24, 2023Updated 2 years ago
- Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection☆15Dec 19, 2022Updated 3 years ago
- Replication Package for "Compressing Pre-trained Models of Code into 3 MB", ASE 2022☆31Oct 10, 2024Updated last year
- This repo illustrates how to evaluate the artifacts in the paper An Extensive Study on Pre-trained Models for Program Understanding and G…☆27Aug 12, 2022Updated 3 years ago
- The replication package of paper "Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks"☆28Jan 3, 2024Updated 2 years ago
- ☆16Nov 24, 2023Updated 2 years ago
- This repository contains a PyTorch implementation of the ISSTA'24 paper "Graph Neural Networks for Vulnerability Detection: A Counterfact…☆34Jun 6, 2025Updated 9 months ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38May 10, 2018Updated 7 years ago
- ☆20Jun 7, 2025Updated 9 months ago
- ☆82Jul 11, 2023Updated 2 years ago
- 基于图神经网络的切片级漏洞检测及解释方法☆46Oct 22, 2024Updated last year
- ☆47Mar 7, 2025Updated last year
- Fixing SySeVR.☆12Sep 23, 2021Updated 4 years ago
- A Transformer-based Line-Level Vulnerability Prediction☆161Aug 5, 2024Updated last year
- Multi-granularity vulnerability detection with a novel pre-trained code model☆19Dec 15, 2025Updated 3 months ago
- Large Language Models for Software Engineering: A Systematic Literature Review☆19Sep 19, 2024Updated last year
- ☆11Mar 5, 2026Updated 2 weeks ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆42Dec 29, 2023Updated 2 years ago
- A Security Operation Tool Based on Large Language Models 基于大语言模型的安全运营工具☆23Mar 20, 2024Updated 2 years ago
- ☆13Aug 18, 2025Updated 7 months ago
- A python library to build graphs for programs written in different programming languages.☆13May 6, 2022Updated 3 years ago
- The official codes for our paper at COLING 2022: Semantic-Preserving Adversarial Code Comprehension☆12Oct 23, 2022Updated 3 years ago
- This repository offers a detailed taxonomy of existing AI-driven security solutions tailored for DevSecOps, highlighting the current rese…☆19Jul 2, 2025Updated 8 months ago