☆21Dec 4, 2020Updated 5 years ago
Alternatives and similar repositories for C-Code-Slicer
Users that are interested in C-Code-Slicer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A static-analysis tool to detect C/C++ vulnerabilities based on graph comparison☆29Feb 26, 2021Updated 5 years ago
- Labeled vulnerable functions statistics analysis and neural network training☆30Jul 25, 2019Updated 6 years ago
- Intelligent Code Analysis by Computer Vision Techniques and Application to Vulnerability Prediction☆10May 10, 2021Updated 4 years ago
- Data-Driven Software Vulnerability Discovery (SVD)☆13May 27, 2020Updated 5 years ago
- ☆228Jul 25, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆75May 27, 2022Updated 3 years ago
- ☆12Nov 19, 2025Updated 5 months ago
- ☆22May 10, 2022Updated 3 years ago
- ☆41Jan 13, 2023Updated 3 years ago
- 《Nature》&《Science》发表的AI相关文章☆13Sep 7, 2021Updated 4 years ago
- Reproduction package of the paper "DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning" in Automated S…☆21Feb 25, 2023Updated 3 years ago
- ☆352Oct 24, 2024Updated last year
- code and data for paper "Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning", which accepted in SANER …☆12May 8, 2022Updated 3 years ago
- A Modified gem5 for Simulating Virtualized Systems☆11Mar 1, 2015Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Deep learning framework for multimodal sensor fusion.☆13Aug 21, 2017Updated 8 years ago
- The comparison of the performance of different machine learning methods for computer security problems☆10May 19, 2024Updated last year
- Replication of AST Neural Network from Zhang J. et. al (2019) and application to software vulnerability detection☆12Jan 13, 2020Updated 6 years ago
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆22Oct 12, 2022Updated 3 years ago
- MODIT: On Multi-Modal Learning of Editing Source Code.☆20Apr 24, 2021Updated 5 years ago
- An implementation of Contract-Net Protocol in an attacker/defender scenario☆11Jul 8, 2022Updated 3 years ago
- This project intends to develop tools around AFDX. (Avionics Full Duplex Switched Ethernet).☆10Oct 27, 2010Updated 15 years ago
- ☆12Feb 25, 2021Updated 5 years ago
- Network Calculus for end-to-end delay bounds of an AFDX network.☆16Sep 3, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- My Diploma Thesis on ArDrone 2.0 and Turtlebot2 collaboration for efficient exploration of unknown space.☆16Feb 2, 2019Updated 7 years ago
- VUDDY: A Scalable and Accurate Vulnerable Code Clone Detector (S&P'17)☆53Jan 31, 2025Updated last year
- Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks☆258Jan 19, 2024Updated 2 years ago
- MATLAB codes and source data for the experimental calibration of a UAV digital twin☆17Jun 30, 2023Updated 2 years ago
- The dataset in the paper "Detecting '0-Day' Vulnerability: An Empirical Study of Secret Security Patch in OSS", which appears in the 2019…☆14Aug 9, 2023Updated 2 years ago
- A deep learning-based vulnerability detection framework☆76Feb 29, 2024Updated 2 years ago
- DeepSeek-V3, R1 671B on 8xH100 Throughput Benchmarks☆21Mar 13, 2025Updated last year
- ☆14Mar 3, 2022Updated 4 years ago
- Parser utility to generate ASTs from PHP source code suitable to be processed by Joern.☆15Jan 27, 2019Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Implementation of Taint Tracking in LLVM compiler.☆10Jan 1, 2013Updated 13 years ago
- Cross-Project Transfer Representation Learning for Vulnerable Function Discovery☆35Jan 30, 2019Updated 7 years ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆63Feb 23, 2024Updated 2 years ago
- dijkstra algorithm optimized with heap☆14Dec 20, 2018Updated 7 years ago
- 3D feature-based image registration for neuroscience datasets☆14Aug 23, 2017Updated 8 years ago
- ☆83Jul 11, 2023Updated 2 years ago
- Realize The Automation of UAV Cluster by Reinforcement Learning Approach☆12May 21, 2018Updated 7 years ago