AutoPruner: Transformer-based Call Graph Pruning (ESEC/FSE 2022, Research Track)
☆22Dec 7, 2023Updated 2 years ago
Alternatives and similar repositories for AutoPruner
Users that are interested in AutoPruner are comparing it to the libraries listed below
Sorting:
- Chronos: Zero-Shot Identification of Libraries from Vulnerability Reports (ICSE 2023, Technical Track)☆11Jul 23, 2023Updated 2 years ago
- code for "Implant Global and Local Hierarchy Information to Sequence based Code Representation Models"☆12Dec 13, 2024Updated last year
- ☆14Feb 5, 2024Updated 2 years ago
- Audit Node Module folder with YARA rules to identify possible malicious packages hiding in node_moudles☆20Mar 24, 2021Updated 4 years ago
- Replication of AST Neural Network from Zhang J. et. al (2019) and application to software vulnerability detection☆12Jan 13, 2020Updated 6 years ago
- ☆24Oct 8, 2024Updated last year
- The dataset, source code and the results of our ESEC/FSE 2023 paper "An Extensive Study on Adversarial Attack against Pre-trained Models …☆15Feb 19, 2024Updated 2 years ago
- ☆19Nov 12, 2025Updated 4 months ago
- MiDas: Multi-granularity Detector for Vulnerability Fixes (IEEE TSE)☆15Dec 5, 2023Updated 2 years ago
- 李鲁鲁老师的 Copilot-Python 学习。和ChatGPT等大语言模型协同进化。☆10Jun 3, 2025Updated 9 months ago
- HTTP Client and Server in C☆19Dec 2, 2016Updated 9 years ago
- ☆11Aug 21, 2017Updated 8 years ago
- Programs for producing static and dynamic (runtime) call graphs for Java programs☆15Aug 23, 2021Updated 4 years ago
- ☆25Mar 28, 2023Updated 2 years ago
- ☆15Apr 3, 2022Updated 3 years ago
- 主要记录自己编写的android第一代壳和原理理解☆12Mar 6, 2022Updated 4 years ago
- DocChecker: Bootstrapping Code-Text Pretrained Language Model to Detect Inconsistency Between Code and Comment☆15Jan 23, 2024Updated 2 years ago
- Code for Doubly deformable aggregation of covariance matrices for few-shot segmentation☆16Oct 25, 2022Updated 3 years ago
- CClyzer port to souffle lang☆19Jan 29, 2024Updated 2 years ago
- Asking Clarification Questions for Code Generation in General-Purpose Programming Language☆11May 26, 2023Updated 2 years ago
- A working technique to extract the dex, apk, and jar files from Android build images.☆12Feb 1, 2021Updated 5 years ago
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16May 21, 2023Updated 2 years ago
- Automated Generation of Reproducible Test Cases for Android Apps☆12May 14, 2019Updated 6 years ago
- Pytorch implementation for "Video Joint Modelling Based on Hierarchical Transformer for Co-summarization"☆15Aug 24, 2025Updated 6 months ago
- The dataset in the paper "Detecting '0-Day' Vulnerability: An Empirical Study of Secret Security Patch in OSS", which appears in the 2019…☆13Aug 9, 2023Updated 2 years ago
- Malware detection in android using permissions, API calls, CFGs as features☆18Oct 10, 2017Updated 8 years ago
- [EMNLP 2023] The Vault: A Comprehensive Multilingual Dataset for Advancing Code Understanding and Generation☆105Aug 21, 2024Updated last year
- ☆11Nov 27, 2022Updated 3 years ago
- ☆11Sep 15, 2024Updated last year
- ☆11May 9, 2022Updated 3 years ago
- A key-value storage system based on LSM Tree, using Skip List and Bloom Filter to accelerate.☆10Jun 10, 2021Updated 4 years ago
- ☆19Feb 14, 2025Updated last year
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- Some useful tools or scripts(for examlpe: download papers)☆15Sep 5, 2018Updated 7 years ago
- [Findings of ACL 2023] Communication Efficient Federated Learning for Multilingual Machine Translation with Adapter☆12Sep 4, 2023Updated 2 years ago
- ☆15Oct 26, 2021Updated 4 years ago
- ☆26Jul 19, 2022Updated 3 years ago
- Implementation of NRMS "Neural News Recommendation with Multi-Head Self-Attention" (EMNLP2019), in Pytorch☆10Jan 20, 2021Updated 5 years ago
- H2MN: Graph Similarity Learning with Hierarchical Hypergraph Matching Networks (KDD-2021)☆59Apr 16, 2022Updated 3 years ago