jingkai92 / learning-program-representation
☆33Updated 2 years ago
Alternatives and similar repositories for learning-program-representation:
Users that are interested in learning-program-representation are comparing it to the libraries listed below
- ☆41Updated 2 years ago
- ☆44Updated 2 years ago
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆71Updated 2 years ago
- ☆13Updated 3 years ago
- ☆14Updated last year
- ☆12Updated 2 years ago
- ☆22Updated 3 years ago
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆66Updated 2 years ago
- ☆29Updated 4 years ago
- This repository is the replication package of the ICSE22 paper "FIRA: Fine-Grained Graph-Based Code Change Representation for Automated C…☆31Updated 2 years ago
- ☆14Updated last year
- This repository provides the code and guidance for reproducing the results in our ESEC/FSE 2023 submission "Pre-training Code Representat…☆25Updated last year
- Towards Robustness of Deep Program Processing Models – Detection, Estimation and Enhancement☆19Updated 2 years ago
- ☆82Updated 4 years ago
- ☆15Updated 2 years ago
- Replication package for "Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection", ICSE 2024.☆57Updated 5 months ago
- Enhacing Code Pre-trained Models by Contrastive Learning☆33Updated 2 years ago
- [ICSE 2021] - InferCode: Self-Supervised Learning of Code Representations by Predicting Subtrees☆90Updated 3 years ago
- ☆20Updated 4 years ago
- For our ICSE21 paper "CURE: Code-Aware Neural Machine Translation for Automatic Program Repair" by Nan Jiang, Thibaud Lutellier, and Lin …☆55Updated 2 years ago
- ☆27Updated last year
- ☆22Updated 2 years ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆60Updated last year
- Code and dataset for paper C4: Contrastive Cross-Language Code Clone Detection☆27Updated 2 years ago
- ☆30Updated 3 years ago
- This repository contains a PyTorch implementation of the ISSTA'24 paper "Graph Neural Networks for Vulnerability Detection: A Counterfact…☆31Updated 3 months ago
- For our ISSTA23 paper "How Effective are Neural Networks for Fixing Security Vulnerabilities?" by Yi Wu, Nan Jiang, Hung Viet Pham, Thiba…☆34Updated last year
- ☆45Updated 2 years ago
- ☆22Updated last year
- ☆16Updated last year