☆22May 10, 2022Updated 3 years ago
Alternatives and similar repositories for artifact
Users that are interested in artifact are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆56Nov 19, 2022Updated 3 years ago
- ☆228Jul 25, 2024Updated last year
- ☆14Mar 1, 2023Updated 3 years ago
- Code for ICSE'24 Paper☆14Apr 21, 2024Updated last year
- ☆89Feb 1, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆75May 27, 2022Updated 3 years ago
- ☆10Jul 19, 2023Updated 2 years ago
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆77Jun 24, 2022Updated 3 years ago
- ☆10Apr 15, 2023Updated 3 years ago
- ☆12Aug 9, 2020Updated 5 years ago
- ☆22Nov 17, 2021Updated 4 years ago
- ☆16Nov 20, 2022Updated 3 years ago
- A Transformer-based Line-Level Vulnerability Prediction☆164Aug 5, 2024Updated last year
- ☆13May 28, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks☆258Jan 19, 2024Updated 2 years ago
- Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection☆15Dec 19, 2022Updated 3 years ago
- ☆16Nov 24, 2023Updated 2 years ago
- Replication package for "Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection", ICSE 2024.☆75Sep 24, 2024Updated last year
- [ASE'23] When Less is Enough: Positive-Unlabeled Learning Model for Vulnerability Detection☆16Jan 12, 2024Updated 2 years ago
- ☆14Mar 3, 2022Updated 4 years ago
- ☆16Aug 26, 2023Updated 2 years ago
- ☆16Jan 17, 2024Updated 2 years ago
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆117Apr 7, 2026Updated last week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38May 10, 2018Updated 7 years ago
- This repo illustrates how to evaluate the artifacts in the paper An Extensive Study on Pre-trained Models for Program Understanding and G…☆27Aug 12, 2022Updated 3 years ago
- A deep learning model for localizing bugs in C/C++ source code (USENIX'23)☆159Jun 28, 2023Updated 2 years ago
- ☆11May 14, 2024Updated last year
- ☆350Oct 24, 2024Updated last year
- ☆13Feb 29, 2024Updated 2 years ago
- VulnerabilityDetectionResearch☆94Mar 22, 2022Updated 4 years ago
- Revisiting Graph Neural Networks for Vulnerability Detection (ICSE 2022) (Pytorch)☆83Mar 10, 2022Updated 4 years ago
- ☆32Jul 13, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆16Aug 16, 2023Updated 2 years ago
- ☆26Feb 6, 2024Updated 2 years ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆42Dec 29, 2023Updated 2 years ago
- Enhacing Code Pre-trained Models by Contrastive Learning☆39Mar 8, 2023Updated 3 years ago
- ☆22Mar 21, 2024Updated 2 years ago
- VulDeePecker: A Deep Learning-Based System for Vulnerability Detection☆349Nov 17, 2020Updated 5 years ago
- Software Vulnerabilities to Weakness Mapping☆24Feb 24, 2022Updated 4 years ago