sadiaTab / CPJITSDPLinks
The implementation of Online Cross-Project JIT-SDP approaches proposed in the paper "Cross-Project Online Just-In-Time Software Defect Prediction" accepted in IEEE Transactions on Software Engineering (TSE), 2022, (accepted).
☆10Updated 3 years ago
Alternatives and similar repositories for CPJITSDP
Users that are interested in CPJITSDP are comparing it to the libraries listed below
Sorting:
- ☆12Updated last year
- Supplementary code and data of the paper Evaluating network embedding techniques' performances in software bug prediction☆11Updated 4 years ago
- ☆35Updated 3 years ago
- This repo illustrates how to evaluate the artifacts in the paper Deep Just-in-Time Defect Prediction: How Far Are We? published in ISSTA'…☆37Updated last year
- Github defect dataset for software defect prediction☆40Updated 3 years ago
- [SANER 2023] MixCode: Enhancing Code Classification by Mixup-Based Data Augmentation☆15Updated last year
- ☆17Updated 2 years ago
- ☆212Updated last year
- PRIMISE dataset for sofware defect prediction☆50Updated 5 years ago
- ☆15Updated 6 years ago
- Revisiting Graph Neural Networks for Vulnerability Detection (ICSE 2022) (Pytorch)☆72Updated 3 years ago
- this is the repository for the paper titled "The Best of Both Worlds: Integrating Semantic Features with Expert Features for Defect Predi…☆18Updated last year
- ☆21Updated 5 years ago
- ☆49Updated 2 years ago
- Experimental Deep Learning for Code Generation Processes☆13Updated 6 years ago
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆110Updated 3 years ago
- ☆85Updated 4 years ago
- Code and data for paper "Detecting Code Clones with Graph Neural Network and Flow-Augmented Abstract Syntax Tree".☆67Updated 3 years ago
- Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks☆233Updated last year
- Software defect prediction based on gated hierarchical LSTMs☆20Updated 2 years ago
- ☆12Updated 2 years ago
- Code using in Paper "Smart Contract Vulnerability Detection Based on Semantic Graph and Residual Graph Convolutional Networks with Edge A …☆16Updated 2 years ago
- VulnerabilityDetectionResearch☆89Updated 3 years ago
- ☆75Updated 2 years ago
- When Less is Enough: Positive-Unlabeled Learning Model for Vulnerability Detection☆13Updated last year
- ☆12Updated last year
- ☆14Updated 2 years ago
- Code for ICSE'24 Paper☆10Updated last year
- ☆18Updated 6 years ago
- We propose a novel adversarial example generation technique (i.e., CODA) for testing deep code models. Its key idea is to use code differ…☆15Updated last year