ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2006.08614
  4. Cited By
Learning to map source code to software vulnerability using
  code-as-a-graph

Learning to map source code to software vulnerability using code-as-a-graph

15 June 2020
Sahil Suneja
Yunhui Zheng
Yufan Zhuang
Jim Laredo
Alessandro Morari
ArXivPDFHTML

Papers citing "Learning to map source code to software vulnerability using code-as-a-graph"

7 / 7 papers shown
Title
A Survey of Source Code Representations for Machine Learning-Based Cybersecurity Tasks
A Survey of Source Code Representations for Machine Learning-Based Cybersecurity Tasks
B.K. Casey
Joanna C. S. Santos
George Perry
63
5
0
15 Mar 2024
Use of Graph Neural Networks in Aiding Defensive Cyber Operations
Use of Graph Neural Networks in Aiding Defensive Cyber Operations
Shaswata Mitra
Trisha Chakraborty
Subash Neupane
Aritran Piplai
Sudip Mittal
AAML
50
3
0
11 Jan 2024
A Unified Active Learning Framework for Annotating Graph Data with
  Application to Software Source Code Performance Prediction
A Unified Active Learning Framework for Annotating Graph Data with Application to Software Source Code Performance Prediction
P. Samoaa
Linus Aronsson
Antonio Longa
Philipp Leitner
M. Chehreghani
24
6
0
06 Apr 2023
Data-Driven AI Model Signal-Awareness Enhancement and Introspection
Data-Driven AI Model Signal-Awareness Enhancement and Introspection
Sahil Suneja
Yufan Zhuang
Yunhui Zheng
Jim Laredo
Alessandro Morari
SyDa
32
1
0
10 Nov 2021
Combining Graph Neural Networks with Expert Knowledge for Smart Contract
  Vulnerability Detection
Combining Graph Neural Networks with Expert Knowledge for Smart Contract Vulnerability Detection
Zhenguang Liu
Peng Qian
Xiaoyang Wang
Yuan Zhuang
Lin Qiu
Xun Wang
27
206
0
24 Jul 2021
D2A: A Dataset Built for AI-Based Vulnerability Detection Methods Using
  Differential Analysis
D2A: A Dataset Built for AI-Based Vulnerability Detection Methods Using Differential Analysis
Yunhui Zheng
Saurabh Pujar
B. Lewis
Luca Buratti
Edward Epstein
Bo Yang
Jim Laredo
Alessandro Morari
Zhong Su
27
125
0
16 Feb 2021
Probing Model Signal-Awareness via Prediction-Preserving Input
  Minimization
Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
Sahil Suneja
Yunhui Zheng
Yufan Zhuang
Jim Laredo
Alessandro Morari
AAML
32
33
0
25 Nov 2020
1