duyali2000 / SemanticFlowGraphLinks
This repository provides the code and guidance for reproducing the results in our ESEC/FSE 2023 submission "Pre-training Code Representations with Semantic Flow Graph for Effective Bug Localization".
☆27Updated last year
Alternatives and similar repositories for SemanticFlowGraph
Users that are interested in SemanticFlowGraph are comparing it to the libraries listed below
Sorting:
- VulRepair: A T5-Based Automated Software Vulnerability Repair☆81Updated 6 months ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆43Updated last year
- ☆32Updated 3 years ago
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆74Updated 3 years ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆62Updated last year
- ☆14Updated last year
- ☆19Updated last year
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆73Updated 3 years ago
- ☆21Updated 3 years ago
- Vul4J: A Dataset of Reproducible Java Vulnerabilities☆105Updated 2 months ago
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆98Updated 2 years ago
- CONCOCTION is an automated machine learning-based vulnerability detection framework that combines static source code information and dyna…☆29Updated last year
- holding data and processing code for the paper 'A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lesso…☆20Updated 5 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆48Updated 2 years ago
- ☆13Updated last year
- Replication package for "Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection", ICSE 2024.☆67Updated last year
- ☆36Updated 4 months ago
- Vision Transformer-Inspired Automated Vulnerability Repair☆19Updated 6 months ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Updated 3 years ago
- ☆15Updated 2 years ago
- ☆13Updated 2 years ago
- For our ISSTA23 paper "How Effective are Neural Networks for Fixing Security Vulnerabilities?" by Yi Wu, Nan Jiang, Hung Viet Pham, Thiba…☆40Updated 2 years ago
- ☆30Updated 4 years ago
- Deep learning code semantic similarity☆65Updated 6 years ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38Updated 7 years ago
- Parsing-based Analyzer☆57Updated 5 months ago
- For our ISSTA22 paper "DocTer: Documentation-Guided Fuzzing for Testing Deep Learning API Functions" by Danning Xie, Yitong Li, Mijung Ki…☆37Updated 3 years ago
- ☆45Updated 3 years ago
- An empirical study on patch correctness☆15Updated 3 years ago
- implementation of ideas from 'Neutaint: Efficient Dynamic Taint Analysis with Neural Networks'☆14Updated 6 years ago