ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1902.02595
  4. Cited By
A Manually-Curated Dataset of Fixes to Vulnerabilities of Open-Source
  Software
v1v2v3 (latest)

A Manually-Curated Dataset of Fixes to Vulnerabilities of Open-Source Software

7 February 2019
Serena Elisa Ponta
H. Plate
A. Sabetta
M. Bezzi
Cédric Dangremont
ArXiv (abs)PDFHTML

Papers citing "A Manually-Curated Dataset of Fixes to Vulnerabilities of Open-Source Software"

32 / 32 papers shown
Title
Today's Cat Is Tomorrow's Dog: Accounting for Time-Based Changes in the Labels of ML Vulnerability Detection Approaches
Today's Cat Is Tomorrow's Dog: Accounting for Time-Based Changes in the Labels of ML Vulnerability Detection Approaches
Ranindya Paramitha
Yuan Feng
Fabio Massacci
MLAU
20
0
0
13 Jun 2025
AI-Based Software Vulnerability Detection: A Systematic Literature Review
AI-Based Software Vulnerability Detection: A Systematic Literature Review
Samiha Shimmi
Hamed Okhravi
Mona Rahimi
112
0
0
12 Jun 2025
VADER: A Human-Evaluated Benchmark for Vulnerability Assessment, Detection, Explanation, and Remediation
VADER: A Human-Evaluated Benchmark for Vulnerability Assessment, Detection, Explanation, and Remediation
Ethan TS. Liu
Austin Wang
Spencer Mateega
Carlos Georgescu
Danny Tang
ELM
37
0
0
26 May 2025
Large Language Model (LLM) for Software Security: Code Analysis, Malware Analysis, Reverse Engineering
Large Language Model (LLM) for Software Security: Code Analysis, Malware Analysis, Reverse Engineering
Hamed Jelodar
Samita Bai
Parisa Hamedi
Hesamodin Mohammadian
R. Razavi-Far
Ali Ghorbani
79
2
0
07 Apr 2025
Vulnerability Detection: From Formal Verification to Large Language Models and Hybrid Approaches: A Comprehensive Overview
Norbert Tihanyi
Tamás Bisztray
M. Ferrag
Bilel Cherif
Richard A. Dubniczky
Ridhi Jain
Lucas C. Cordeiro
108
1
0
13 Mar 2025
SoK: Towards Effective Automated Vulnerability Repair
SoK: Towards Effective Automated Vulnerability Repair
Ying Li
Faysal hossain shezan
Bomin wei
Gang Wang
Yuan Tian
201
2
0
31 Jan 2025
Is Your AI-Generated Code Really Safe? Evaluating Large Language Models
  on Secure Code Generation with CodeSecEval
Is Your AI-Generated Code Really Safe? Evaluating Large Language Models on Secure Code Generation with CodeSecEval
Jiexin Wang
Xitong Luo
Liuwen Cao
Hongkui He
Hailin Huang
Jiayuan Xie
Adam Jatowt
Yi Cai
ELM
72
17
0
02 Jul 2024
On the Effectiveness of Machine Learning-based Call Graph Pruning: An
  Empirical Study
On the Effectiveness of Machine Learning-based Call Graph Pruning: An Empirical Study
A. Mir
Mehdi Keshani
Sebastian Proksch
45
1
0
11 Feb 2024
Finetuning Large Language Models for Vulnerability Detection
Finetuning Large Language Models for Vulnerability Detection
Alexey Shestov
Rodion Levichev
Ravil Mussabayev
Evgeny Maslov
Anton Cheshkov
Pavel Zadorozhny
80
31
0
30 Jan 2024
VFCFinder: Seamlessly Pairing Security Advisories and Patches
VFCFinder: Seamlessly Pairing Security Advisories and Patches
T. Dunlap
Elizabeth Lin
William Enck
Bradley Reaves
39
4
0
02 Nov 2023
Enhancing Large Language Models for Secure Code Generation: A
  Dataset-driven Study on Vulnerability Mitigation
Enhancing Large Language Models for Secure Code Generation: A Dataset-driven Study on Vulnerability Mitigation
Jiexin Wang
Liuwen Cao
Xitong Luo
Zhiping Zhou
Jiayuan Xie
Adam Jatowt
Yi Cai
64
14
0
25 Oct 2023
How well does LLM generate security tests?
How well does LLM generate security tests?
Ying Zhang
Wen-Kai Song
Zhengjie Ji
Danfeng
D. Yao
Na Meng
65
36
0
01 Oct 2023
Exploring Security Commits in Python
Exploring Security Commits in Python
Shiyu Sun
Shu Wang
Xinda Wang
Yunlong Xing
Elisa Zhang
Kun Sun
44
2
0
21 Jul 2023
Uncovering the Limits of Machine Learning for Automatic Vulnerability
  Detection
Uncovering the Limits of Machine Learning for Automatic Vulnerability Detection
Niklas Risse
Marcel Bohme
AAML
140
32
0
28 Jun 2023
How Effective Are Neural Networks for Fixing Security Vulnerabilities
How Effective Are Neural Networks for Fixing Security Vulnerabilities
Yi Wu
Nan Jiang
H. Pham
Thibaud Lutellier
Jordan Davis
Lin Tan
Petr Babkin
Sameena Shah
AAML
99
97
0
29 May 2023
Sequential Graph Neural Networks for Source Code Vulnerability
  Identification
Sequential Graph Neural Networks for Source Code Vulnerability Identification
Ammar Ahmed
Anwar Said
Mudassir Shabbir
X. Koutsoukos
GNN
41
2
0
23 May 2023
Multi-Granularity Detector for Vulnerability Fixes
Multi-Granularity Detector for Vulnerability Fixes
Truong-Giang Nguyen
Thanh Le-Cong
Hong Jin Kang
Ratnadira Widyasari
Chengran Yang
...
Jiayuan Zhou
Xin Xia
A. Hassan
X. Le
David Lo
54
19
0
23 May 2023
LLMSecEval: A Dataset of Natural Language Prompts for Security
  Evaluations
LLMSecEval: A Dataset of Natural Language Prompts for Security Evaluations
Catherine Tony
Markus Mutas
Nicolás E. Díaz Ferreyra
Riccardo Scandariato
ELM
52
50
0
16 Mar 2023
Silent Vulnerable Dependency Alert Prediction with Vulnerability Key
  Aspect Explanation
Silent Vulnerable Dependency Alert Prediction with Vulnerability Key Aspect Explanation
Jiamou Sun
Zhenchang Xing
Qinghua Lu
Xiwei Xu
Liming Zhu
Thong Hoang
Dehai Zhao
72
15
0
15 Feb 2023
Early Detection of Security-Relevant Bug Reports using Machine Learning:
  How Far Are We?
Early Detection of Security-Relevant Bug Reports using Machine Learning: How Far Are We?
Arthur D. Sawadogo
Quentin Guimard
Tegawende F. Bissyande
Abdoul Kader Kaboré
Jacques Klein
Naouel Moha
33
7
0
19 Dec 2021
Tracking Patches for Open Source Software Vulnerabilities
Tracking Patches for Open Source Software Vulnerabilities
Congying Xu
Bihuan Chen
Chenhao Lu
Kaifeng Huang
Xin Peng
Yang Liu
41
30
0
04 Dec 2021
A Survey on Machine Learning Techniques for Source Code Analysis
A Survey on Machine Learning Techniques for Source Code Analysis
Tushar Sharma
M. Kechagia
Stefanos Georgiou
Rohit Tiwari
Indira Vats
Hadi Moazen
Federica Sarro
83
65
0
18 Oct 2021
DeepCVA: Automated Commit-level Vulnerability Assessment with Deep
  Multi-task Learning
DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning
T. H. Le
David Hin
Roland Croft
Muhammad Ali Babar
64
56
0
18 Aug 2021
Few-Sample Named Entity Recognition for Security Vulnerability Reports
  by Fine-Tuning Pre-Trained Language Models
Few-Sample Named Entity Recognition for Security Vulnerability Reports by Fine-Tuning Pre-Trained Language Models
Guanqun Yang
Shay Dineen
Zhipeng Lin
Xueqing Liu
AAML
66
15
0
14 Aug 2021
CVEfixes: Automated Collection of Vulnerabilities and Their Fixes from
  Open-Source Software
CVEfixes: Automated Collection of Vulnerabilities and Their Fixes from Open-Source Software
G. Bhandari
Amara Naseer
Leon Moonen
70
166
0
19 Jul 2021
Fixing Vulnerabilities Potentially Hinders Maintainability
Fixing Vulnerabilities Potentially Hinders Maintainability
Sofia Reis
Rui Abreu
Luís Cruz
34
3
0
06 Jun 2021
Detecting Security Fixes in Open-Source Repositories using Static Code
  Analyzers
Detecting Security Fixes in Open-Source Repositories using Static Code Analyzers
Therese Fehrer
Rocío Cabrera Lozoya
A. Sabetta
Dario Di Nucci
Damian Tamburri
6
3
0
07 May 2021
Neural Transfer Learning for Repairing Security Vulnerabilities in C
  Code
Neural Transfer Learning for Repairing Security Vulnerabilities in C Code
Zimin Chen
Steve Kommrusch
Monperrus Martin
91
127
0
16 Apr 2021
Automated Mapping of Vulnerability Advisories onto their Fix Commits in
  Open Source Repositories
Automated Mapping of Vulnerability Advisories onto their Fix Commits in Open Source Repositories
Daan Hommersom
A. Sabetta
Bonaventura Coppola
Dario Di Nucci
Damian Tamburri
62
10
0
24 Mar 2021
SeqTrans: Automatic Vulnerability Fix via Sequence to Sequence Learning
SeqTrans: Automatic Vulnerability Fix via Sequence to Sequence Learning
Jianlei Chi
YunHuan Qu
Ting Liu
Q. Zheng
Heng Yin
91
57
0
21 Oct 2020
Commit2Vec: Learning Distributed Representations of Code Changes
Commit2Vec: Learning Distributed Representations of Code Changes
Rocío Cabrera Lozoya
Arnaud Baumann
A. Sabetta
M. Bezzi
SSL
89
45
0
18 Nov 2019
Exploiting Token and Path-based Representations of Code for Identifying
  Security-Relevant Commits
Exploiting Token and Path-based Representations of Code for Identifying Security-Relevant Commits
Achyudh Ram
Ji Xin
M. Nagappan
Yaoliang Yu
Rocío Cabrera Lozoya
A. Sabetta
Jimmy J. Lin
29
3
0
15 Nov 2019
1