toolstemp / IAcontract
☆11Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for IAcontract
- ☆39Updated 3 years ago
- ☆13Updated 7 months ago
- MANDO is a new heterogeneous graph representation to learn the heterogeneous contract graphs' structures to accurately detect vulnerabili…☆31Updated last year
- This is the dataset for our TSE paper "Defining Smart Contracts Defects on Ethereum"☆16Updated 4 years ago
- Code using in Paper "Smart Contract Vulnerability Detection Based on Semantic Graph and Residual Graph Convolutional Networks with Edge A…☆15Updated last year
- A project to automatically generate program repair recommendation in the field of smart contracts for given code snippets with their cont…☆11Updated 7 months ago
- ☆13Updated 2 years ago
- Cross-Modality Mutual Learning for Smart Contract Vulnerability Detection☆27Updated last year
- ☆11Updated last year
- Smart Contract Vulnerability Detection Based on Deep Learning. (LSTM, BLSTM, BLSTM+Attention)☆26Updated 5 years ago
- ☆76Updated 3 years ago
- ☆66Updated last year
- ☆35Updated 2 years ago
- When Less is Enough: Positive-Unlabeled Learning Model for Vulnerability Detection☆11Updated 10 months ago
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆14Updated last year
- VulnerabilityDetectionResearch☆76Updated 2 years ago
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆69Updated 2 years ago
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆89Updated 2 years ago
- ☆21Updated 3 years ago
- Revisiting Graph Neural Networks for Vulnerability Detection (ICSE 2022) (Pytorch)☆64Updated 2 years ago
- ☆9Updated last year
- ☆13Updated last year
- The replication package of paper "Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks"☆16Updated 10 months ago
- ☆28Updated 3 years ago
- ☆22Updated last year
- ☆11Updated 8 months ago
- ☆22Updated 2 years ago
- ☆19Updated 4 years ago
- Labeled vulnerable functions statistics analysis and neural network training☆25Updated 5 years ago
- ☆19Updated last year