guanqun-yang / FewVulnerability
Detecting software vulnerability described public security reports with minimal training examples
☆13Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for FewVulnerability
- A Survey of Deep Learning Models for Structural Code Understanding☆20Updated 2 years ago
- ☆73Updated last year
- ☆11Updated 5 years ago
- Adversarial Robustness for Code☆16Updated 3 years ago
- ☆15Updated 2 years ago
- Public Arena dataset☆12Updated 2 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 2 years ago
- Revisiting Graph Neural Networks for Vulnerability Detection (ICSE 2022) (Pytorch)☆64Updated 2 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆56Updated 2 years ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆55Updated last year
- Hidden backdoor attack on NLP systems☆46Updated 3 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆51Updated 3 years ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆24Updated 4 years ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆77Updated last year
- ☆14Updated 3 years ago
- Vulnerability knowledge graph construction☆19Updated last year
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆37Updated 6 years ago
- Simplified Source Code Pre-Training for Vulnerability Detection☆77Updated 5 months ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆12Updated 3 years ago
- ☆16Updated 8 months ago
- Official repository for MalKG☆20Updated 3 years ago
- CyberAttack Sensing and Information Extraction☆67Updated 3 months ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆33Updated 2 years ago
- Enhacing Code Pre-trained Models by Contrastive Learning☆30Updated last year
- Machine Learning & Security Seminar @Purdue University☆25Updated last year
- ☆19Updated 3 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆59Updated 2 years ago
- ☆11Updated 5 years ago
- The Tangled Genealogy of IoT Malware☆10Updated 3 years ago