lxyeternal / Paper-Reading
主要是自己看过的一些论文,同时做了对应的思维导图,以供大家参考学习。
☆12Updated 2 years ago
Alternatives and similar repositories for Paper-Reading:
Users that are interested in Paper-Reading are comparing it to the libraries listed below
- A paper list of vulnerability detection using deep learning (updating)☆13Updated 8 months ago
- ☆78Updated 3 years ago
- FUNDED is a novel learning framework for building vulnerability detection models.☆127Updated last year
- VulDeePecker algorithm implemented in Python☆108Updated 5 years ago
- This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sa…☆205Updated 8 months ago
- ☆45Updated 6 years ago
- ☆69Updated last year
- ☆190Updated 5 months ago
- ☆23Updated 2 years ago
- This repository complements our paper by offering the training dataset, the best-performing models utilized in our real-world experiment,…☆16Updated 10 months ago
- 该资源是各种溯源图相关的论文和资源总结(含PPT),涉及APT攻击检测、入侵检测、流量日志检测、系统安全等领域,希望对大家有所帮助~☆150Updated last year
- ☆17Updated 8 months ago
- ☆9Updated last year
- A deep learning-based vulnerability detection framework☆74Updated 10 months ago
- A C/C++ Code Vulnerability Dataset with Code Changes and CVE Summaries☆258Updated 3 years ago
- Usenix Security'23☆13Updated last year
- VulnerabilityDetectionResearch☆79Updated 2 years ago
- A Transformer-based Line-Level Vulnerability Prediction☆121Updated 5 months ago
- ☆318Updated 2 months ago
- NVD,CNNVD软件漏洞数据集,漏洞文本预处理,训练算法模型进行漏洞分类☆10Updated 6 years ago
- Labeled vulnerable functions statistics analysis and neural network training☆25Updated 5 years ago
- vulnerability detection in python source code with LSTM networks☆128Updated 4 years ago
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆93Updated 2 years ago
- ☆40Updated 2 years ago
- ☆23Updated 3 years ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆65Updated 2 months ago
- 基于溯源图的入侵/威胁检测相关论文及阅读笔记☆17Updated last year
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆27Updated 5 months ago
- ☆96Updated last year
- ☆11Updated last year