Picture for Jim Laredo

Jim Laredo

VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements

Add code
Jan 13, 2022
Figure 1 for VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements
Figure 2 for VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements
Figure 3 for VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements
Figure 4 for VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements
Viaarxiv icon

Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection

Add code
Nov 10, 2021
Figure 1 for Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection
Figure 2 for Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection
Figure 3 for Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection
Figure 4 for Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection
Viaarxiv icon

Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation

Add code
Sep 07, 2021
Figure 1 for Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation
Figure 2 for Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation
Figure 3 for Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation
Figure 4 for Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation
Viaarxiv icon

D2A: A Dataset Built for AI-Based Vulnerability Detection Methods Using Differential Analysis

Add code
Feb 16, 2021
Figure 1 for D2A: A Dataset Built for AI-Based Vulnerability Detection Methods Using Differential Analysis
Figure 2 for D2A: A Dataset Built for AI-Based Vulnerability Detection Methods Using Differential Analysis
Figure 3 for D2A: A Dataset Built for AI-Based Vulnerability Detection Methods Using Differential Analysis
Figure 4 for D2A: A Dataset Built for AI-Based Vulnerability Detection Methods Using Differential Analysis
Viaarxiv icon

Probing Model Signal-Awareness via Prediction-Preserving Input Minimization

Add code
Nov 25, 2020
Figure 1 for Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
Figure 2 for Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
Figure 3 for Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
Figure 4 for Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
Viaarxiv icon

Exploring Software Naturalness through Neural Language Models

Add code
Jun 24, 2020
Figure 1 for Exploring Software Naturalness through Neural Language Models
Figure 2 for Exploring Software Naturalness through Neural Language Models
Figure 3 for Exploring Software Naturalness through Neural Language Models
Figure 4 for Exploring Software Naturalness through Neural Language Models
Viaarxiv icon

Learning to map source code to software vulnerability using code-as-a-graph

Add code
Jun 15, 2020
Figure 1 for Learning to map source code to software vulnerability using code-as-a-graph
Figure 2 for Learning to map source code to software vulnerability using code-as-a-graph
Figure 3 for Learning to map source code to software vulnerability using code-as-a-graph
Figure 4 for Learning to map source code to software vulnerability using code-as-a-graph
Viaarxiv icon