Replication Package for "Compressing Pre-trained Models of Code into 3 MB", ASE 2022
☆31Oct 10, 2024Updated last year
Alternatives and similar repositories for Compressor
Users that are interested in Compressor are comparing it to the libraries listed below
Sorting:
- ☆10Apr 15, 2023Updated 2 years ago
- ☆15Jan 17, 2024Updated 2 years ago
- Multi-granularity vulnerability detection with a novel pre-trained code model☆18Dec 15, 2025Updated 2 months ago
- ☆16Nov 20, 2022Updated 3 years ago
- ☆25Apr 25, 2024Updated last year
- Vision Transformer-Inspired Automated Vulnerability Repair☆19May 13, 2025Updated 9 months ago
- A list of papers and resources dedicated to code generation☆20Nov 2, 2022Updated 3 years ago
- Semantic Scaffolds for Pseudocode-to-Code Generation (accepted by ACL 2020)☆14Jun 7, 2021Updated 4 years ago
- ☆11May 14, 2024Updated last year
- ☆12Aug 9, 2023Updated 2 years ago
- Replication package for "Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection", ICSE 2024.☆73Sep 24, 2024Updated last year
- Code for ICSE'24 Paper☆14Apr 21, 2024Updated last year
- ☆21May 10, 2022Updated 3 years ago
- MegaVul - The largest, high-quality, extensible, continuously updated, C/C++/Java vulnerability dataset☆138Jan 12, 2025Updated last year
- ☆13Feb 29, 2024Updated last year
- Fixing SySeVR.☆12Sep 23, 2021Updated 4 years ago
- ☆16Nov 24, 2023Updated 2 years ago
- ☆223Jul 25, 2024Updated last year
- Lyra: A Benchmark for Turducken-Style Code Generation☆15Apr 22, 2022Updated 3 years ago
- ☆13May 28, 2023Updated 2 years ago
- ☆14Mar 1, 2023Updated 2 years ago
- Learning from what we know: How to perform vulnerability prediction using noisy historical data, Empirical Software Engineering (EMSE)☆14Sep 20, 2023Updated 2 years ago
- An implementation of the ACL 2024 Findings paper "Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tu…☆75Oct 29, 2025Updated 4 months ago
- ☆16Aug 16, 2023Updated 2 years ago
- Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection☆14Dec 19, 2022Updated 3 years ago
- The official repository for the paper "VulScribeR: Exploring RAG-based Vulnerability Augmentation with LLMs".☆23Dec 9, 2025Updated 2 months ago
- 🤗An unofficial PyTorch implementation of ConvBert based on huggingface/transformers.☆17Oct 6, 2022Updated 3 years ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38May 10, 2018Updated 7 years ago
- ☆39May 11, 2023Updated 2 years ago
- ☆41Jan 13, 2023Updated 3 years ago
- [ASE'23] When Less is Enough: Positive-Unlabeled Learning Model for Vulnerability Detection☆16Jan 12, 2024Updated 2 years ago
- Code for ReF Decompile: Relabeling and Function Call Enhanced Decompile☆26Dec 7, 2025Updated 2 months ago
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆19Nov 24, 2023Updated 2 years ago
- ☆46Mar 7, 2025Updated 11 months ago
- Replication package for ISSTA2023 paper - Towards Efficient Fine-tuning of Pre-trained Code Models: An Experimental Study and Beyond☆23Apr 9, 2023Updated 2 years ago
- Generating Adversarial Examples for Holding Robustness of Source Code Processing Models☆14Dec 2, 2021Updated 4 years ago
- ☆22Dec 6, 2023Updated 2 years ago
- VulRepair: A T5-Based Automated Software Vulnerability Repair☆84May 13, 2025Updated 9 months ago
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆75Jun 24, 2022Updated 3 years ago