ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2406.11147
  4. Cited By
Vul-RAG: Enhancing LLM-based Vulnerability Detection via Knowledge-level
  RAG

Vul-RAG: Enhancing LLM-based Vulnerability Detection via Knowledge-level RAG

17 June 2024
Xueying Du
Geng Zheng
Kaixin Wang
Jiayi Feng
Wentai Deng
Mingwei Liu
Bihuan Chen
Xin Peng
Tao Ma
Yiling Lou
ArXivPDFHTML

Papers citing "Vul-RAG: Enhancing LLM-based Vulnerability Detection via Knowledge-level RAG"

10 / 10 papers shown
Title
The Digital Cybersecurity Expert: How Far Have We Come?
The Digital Cybersecurity Expert: How Far Have We Come?
Dawei Wang
Geng Zhou
Xianglong Li
Yu Bai
Li Chen
Ting Qin
Jian Sun
D. Li
ELM
62
0
0
16 Apr 2025
Frontier AI's Impact on the Cybersecurity Landscape
Frontier AI's Impact on the Cybersecurity Landscape
Wenbo Guo
Yujin Potter
Tianneng Shi
Zhun Wang
Andy Zhang
Dawn Song
52
1
0
07 Apr 2025
A Framework for Evaluating Emerging Cyberattack Capabilities of AI
A Framework for Evaluating Emerging Cyberattack Capabilities of AI
Mikel Rodriguez
Raluca Ada Popa
Four Flynn
Lihao Liang
Allan Dafoe
Anna Wang
ELM
66
3
0
14 Mar 2025
KNighter: Transforming Static Analysis with LLM-Synthesized Checkers
KNighter: Transforming Static Analysis with LLM-Synthesized Checkers
Chenyuan Yang
Zijie Zhao
Zichen Xie
Haoyu Li
Lingming Zhang
60
0
0
12 Mar 2025
ProveRAG: Provenance-Driven Vulnerability Analysis with Automated Retrieval-Augmented LLMs
ProveRAG: Provenance-Driven Vulnerability Analysis with Automated Retrieval-Augmented LLMs
Reza Fayyazi
Stella Hoyos Trueba
Michael Zuzak
S. Yang
35
0
0
22 Oct 2024
When LLMs Meet Cybersecurity: A Systematic Literature Review
When LLMs Meet Cybersecurity: A Systematic Literature Review
Jie Zhang
Haoyu Bu
Hui Wen
Yu Chen
Lun Li
Hongsong Zhu
42
36
0
06 May 2024
Chain-of-Thought Prompting of Large Language Models for Discovering and
  Fixing Software Vulnerabilities
Chain-of-Thought Prompting of Large Language Models for Discovering and Fixing Software Vulnerabilities
Yu Nong
Mohammed Aldeen
Long Cheng
Hongxin Hu
Feng Chen
Haipeng Cai
LRM
26
27
0
27 Feb 2024
Few-shot training LLMs for project-specific code-summarization
Few-shot training LLMs for project-specific code-summarization
Toufique Ahmed
Prem Devanbu
179
213
0
09 Jul 2022
VulBERTa: Simplified Source Code Pre-Training for Vulnerability
  Detection
VulBERTa: Simplified Source Code Pre-Training for Vulnerability Detection
Hazim Hanif
S. Maffeis
63
95
0
25 May 2022
Chain-of-Thought Prompting Elicits Reasoning in Large Language Models
Chain-of-Thought Prompting Elicits Reasoning in Large Language Models
Jason W. Wei
Xuezhi Wang
Dale Schuurmans
Maarten Bosma
Brian Ichter
F. Xia
Ed H. Chi
Quoc Le
Denny Zhou
LM&Ro
LRM
AI4CE
ReLM
367
8,495
0
28 Jan 2022
1