Code for the paper(VDoTR: Vulnerability Detection Based on Tensor Representation \\of Comprehensive Code Graphs)
☆17Apr 23, 2023Updated 3 years ago
Alternatives and similar repositories for VDoTR
Users that are interested in VDoTR are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 📖源码安全相关的论文收集(污点分析/符号执行/模糊测试)☆21Oct 23, 2021Updated 4 years ago
- This repository contains a PyTorch implementation of the ISSTA'24 paper "Graph Neural Networks for Vulnerability Detection: A Counterfact…☆34Jun 6, 2025Updated 11 months ago
- A paper list of vulnerability detection using deep learning (updating)☆14Apr 26, 2024Updated 2 years ago
- Revisiting Graph Neural Networks for Vulnerability Detection (ICSE 2022) (Pytorch)☆84Mar 10, 2022Updated 4 years ago
- ☆14Mar 1, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Smart Contract Security Vulnerability Detection Method based on Target-guided Symbolic Execution☆13Jul 24, 2022Updated 3 years ago
- Replication of AST Neural Network from Zhang J. et. al (2019) and application to software vulnerability detection☆12Jan 13, 2020Updated 6 years ago
- LSTM-based smart contract reentry vulnerability detection.☆10Apr 14, 2019Updated 7 years ago
- Open-source repository for the ISSTA'23 paper "CONCORD: Clone-aware Contrastive Learning for Source Code"☆11Nov 10, 2023Updated 2 years ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Oct 18, 2022Updated 3 years ago
- ☆13Feb 29, 2024Updated 2 years ago
- ☆16Jan 17, 2024Updated 2 years ago
- Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection☆15Dec 19, 2022Updated 3 years ago
- DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection (RAID 2023) https://surrealyz.github.io/…☆179Oct 23, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆13May 28, 2023Updated 2 years ago
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆29Jul 24, 2023Updated 2 years ago
- Code for the paper - Source Code Vulnerability Detection: Combining Code Language Models and Code Property Graph☆100Apr 21, 2024Updated 2 years ago
- [ASE'23] When Less is Enough: Positive-Unlabeled Learning Model for Vulnerability Detection☆16Jan 12, 2024Updated 2 years ago
- Supplementary code and data of the paper Evaluating network embedding techniques' performances in software bug prediction☆11Aug 13, 2021Updated 4 years ago
- MANDO is a new heterogeneous graph representation to learn the heterogeneous contract graphs' structures to accurately detect vulnerabili…☆36Apr 13, 2026Updated 3 weeks ago
- BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection☆10Oct 2, 2020Updated 5 years ago
- Data pre-processing, analysis, visualization, D-reduction, and classification with different model/data -driven optimization techniques☆11Dec 29, 2019Updated 6 years ago
- A deep learning-based vulnerability detection framework☆76Feb 29, 2024Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- “华为杯”第十六届中国研究生数学建模F题 国家一等奖☆13Jul 7, 2020Updated 5 years ago
- A simple cycle-accurate DaDianNao simulator☆13Mar 27, 2019Updated 7 years ago
- Software defect prediction (predicting logical errors in source code files) using recurrent neural network and convolutional neural netwo…☆12Oct 16, 2020Updated 5 years ago
- Dynamit: Dynamic Vulnerability Detection of Ethereum Smart Contracts Using Machine Learning☆30Nov 6, 2023Updated 2 years ago
- The replication package of paper "Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks"☆28Jan 3, 2024Updated 2 years ago
- software defect prediction☆11Jan 2, 2023Updated 3 years ago
- Static Code Analysis Toolkit for Vulnerability Detection and Mitigation☆38Jul 31, 2023Updated 2 years ago
- A tool for Software Defect Prediction☆12Mar 26, 2021Updated 5 years ago
- KDD Cup 2018 of Fresh Air☆15May 30, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Smart Contract Vulnerability Detection From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion (IJCAI-21 Accept…☆99Feb 28, 2023Updated 3 years ago
- VulnerabilityDetectionResearch☆94Mar 22, 2022Updated 4 years ago
- MuSim - The Microservices simulator☆13Feb 2, 2016Updated 10 years ago
- Implementation of the Snappy compression algorithm as a RoCC accelerator☆12Jul 29, 2019Updated 6 years ago
- Experimental Deep Learning for Code Generation Processes☆13Jan 20, 2019Updated 7 years ago
- A static-analysis tool to detect C/C++ vulnerabilities based on graph comparison☆29Feb 26, 2021Updated 5 years ago
- 基于图神经网络的切片级漏洞检测及解释方法☆46Oct 22, 2024Updated last year