Replication of AST Neural Network from Zhang J. et. al (2019) and application to software vulnerability detection
☆12Jan 13, 2020Updated 6 years ago
Alternatives and similar repositories for svd_exp3
Users that are interested in svd_exp3 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Software vulnerability detection using machine learning through source codes (Exp-1). Replication of https://arxiv.org/abs/1807.04320.☆51Nov 24, 2021Updated 4 years ago
- A repository for code risk analysis, bug prediction, software fault detection, software vulnerability detection, Quality analysis.☆19May 3, 2021Updated 4 years ago
- code and data for paper "Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning", which accepted in SANER …☆13May 8, 2022Updated 3 years ago
- Repository for the Adversarial ML on Code things☆16Jun 25, 2020Updated 5 years ago
- A static-analysis tool to detect C/C++ vulnerabilities based on graph comparison☆29Feb 26, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆13Jul 25, 2024Updated last year
- 本项目使用Keras实现Transformer模型来进行文本分类(中文、英文均支持)。☆12Mar 31, 2022Updated 3 years ago
- Smart Contract Security Vulnerability Detection Method based on Target-guided Symbolic Execution☆13Jul 24, 2022Updated 3 years ago
- This code submission for the ICCV 17 Real Versus Fake Expressed Emotion Challenge provides source code to extract the features and classi…☆11Aug 28, 2017Updated 8 years ago
- 《Nature》&《Science》发表的AI相关文章☆13Sep 7, 2021Updated 4 years ago
- VulDeePecker: A Deep Learning-Based System for Vulnerability Detection☆347Nov 17, 2020Updated 5 years ago
- LSTM-based smart contract reentry vulnerability detection.☆10Apr 14, 2019Updated 6 years ago
- A Transformer-based Line-Level Vulnerability Prediction☆161Aug 5, 2024Updated last year
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆22Oct 12, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- This is an implementation of FATAUVA-Net model in paper: An Integrated Deep Learning Framework for Facial Attribute Recognition, Action U…☆19Mar 2, 2018Updated 8 years ago
- Deep Program Structure Modeling ThroughMulti-Relational Graph-based Learning☆10May 24, 2021Updated 4 years ago
- The dataset, source code and the results of our ESEC/FSE 2023 paper "An Extensive Study on Adversarial Attack against Pre-trained Models …☆15Feb 19, 2024Updated 2 years ago
- IEEE Transactions on Affective Computing "Facial Action Unit Detection Using Attention and Relation Learning"☆14Aug 7, 2025Updated 7 months ago
- A paper list of vulnerability detection using deep learning (updating)☆14Apr 26, 2024Updated last year
- vulnerability detection in python source code with LSTM networks☆152Mar 17, 2020Updated 6 years ago
- VUDDY: A Scalable and Accurate Vulnerable Code Clone Detector (S&P'17)☆52Jan 31, 2025Updated last year
- Learning Facial Action Units from Web Images with Scalable Weakly Supervised Clustering (CVPR18)☆16Jul 23, 2018Updated 7 years ago
- ☆10Jan 31, 2021Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Code for the paper(VDoTR: Vulnerability Detection Based on Tensor Representation \\of Comprehensive Code Graphs)☆17Apr 23, 2023Updated 2 years ago
- ☆12Feb 25, 2021Updated 5 years ago
- Programs for producing static and dynamic (runtime) call graphs for Java programs☆15Aug 23, 2021Updated 4 years ago
- ☆20Apr 12, 2024Updated last year
- Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection☆15Dec 19, 2022Updated 3 years ago
- Python script to scan for BLE devices and print out their attributes☆12Apr 25, 2021Updated 4 years ago
- ☆14Mar 1, 2023Updated 3 years ago
- ☆13Oct 31, 2022Updated 3 years ago
- Face recognition based Attendance Management System by using OpenCV and python with a Tkinter GUI interface.☆14Aug 9, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Defect prediction of java projects using neural networks.☆15Jun 28, 2017Updated 8 years ago
- ☆21Dec 4, 2020Updated 5 years ago
- ☆29Jan 24, 2026Updated 2 months ago
- Fast I/O for Competitive Programming. Languages - Python, Java, C++, C☆10Jan 21, 2016Updated 10 years ago
- Code for Doubly deformable aggregation of covariance matrices for few-shot segmentation☆16Oct 25, 2022Updated 3 years ago
- AutoPruner: Transformer-based Call Graph Pruning (ESEC/FSE 2022, Research Track)☆22Dec 7, 2023Updated 2 years ago
- Revisiting Graph Neural Networks for Vulnerability Detection (ICSE 2022) (Pytorch)☆83Mar 10, 2022Updated 4 years ago