sadiaTab / CPJITSDPLinks
The implementation of Online Cross-Project JIT-SDP approaches proposed in the paper "Cross-Project Online Just-In-Time Software Defect Prediction" accepted in IEEE Transactions on Software Engineering (TSE), 2022, (accepted).
☆10Updated 3 years ago
Alternatives and similar repositories for CPJITSDP
Users that are interested in CPJITSDP are comparing it to the libraries listed below
Sorting:
- ☆12Updated last year
- ☆34Updated 3 years ago
- Supplementary code and data of the paper Evaluating network embedding techniques' performances in software bug prediction☆11Updated 3 years ago
- [SANER 2023] MixCode: Enhancing Code Classification by Mixup-Based Data Augmentation☆15Updated last year
- Code for ICSE'24 Paper☆10Updated last year
- ☆49Updated 2 years ago
- This repo illustrates how to evaluate the artifacts in the paper Deep Just-in-Time Defect Prediction: How Far Are We? published in ISSTA'…☆37Updated last year
- ☆16Updated 2 years ago
- ☆12Updated 2 years ago
- Revisiting Graph Neural Networks for Vulnerability Detection (ICSE 2022) (Pytorch)☆71Updated 3 years ago
- this is the repository for the paper titled "The Best of Both Worlds: Integrating Semantic Features with Expert Features for Defect Predi…☆18Updated last year
- ☆12Updated last year
- ☆21Updated 4 years ago
- The replication package of paper "Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks"☆24Updated last year
- Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks☆227Updated last year
- ☆74Updated 2 years ago
- ☆211Updated 11 months ago
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆17Updated last year
- Experimental Deep Learning for Code Generation Processes☆13Updated 6 years ago
- ☆84Updated 4 years ago
- ☆13Updated 2 years ago
- When Less is Enough: Positive-Unlabeled Learning Model for Vulnerability Detection☆13Updated last year
- We propose a novel adversarial example generation technique (i.e., CODA) for testing deep code models. Its key idea is to use code differ…☆14Updated last year
- Learning Program Semantics for Vulnerability Detection via Vulnerability-specific Inter-procedural Slicing☆13Updated last year
- ☆9Updated last year
- VulnerabilityDetectionResearch☆89Updated 3 years ago
- A Transformer-based Line-Level Vulnerability Prediction☆142Updated 11 months ago
- Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Daphne Yao, Na Meng. Example-Based Vulnerability Detection and Repair in Java Code 30th IEEE/AC…☆10Updated 2 years ago
- Github defect dataset for software defect prediction☆39Updated 3 years ago
- ☆20Updated last year