ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2001.02350
  4. Cited By
VulDeeLocator: A Deep Learning-based Fine-grained Vulnerability Detector
v1v2 (latest)

VulDeeLocator: A Deep Learning-based Fine-grained Vulnerability Detector

8 January 2020
Zhuguo Li
Deqing Zou
Shouhuai Xu
Zhaoxuan Chen
Yawei Zhu
Hai Jin
ArXiv (abs)PDFHTML

Papers citing "VulDeeLocator: A Deep Learning-based Fine-grained Vulnerability Detector"

12 / 12 papers shown
Title
Can Neural Decompilation Assist Vulnerability Prediction on Binary Code?
Can Neural Decompilation Assist Vulnerability Prediction on Binary Code?
D. Cotroneo
F. C. Grasso
R. Natella
V. Orbinato
162
0
0
10 Dec 2024
IRIS: LLM-Assisted Static Analysis for Detecting Security Vulnerabilities
IRIS: LLM-Assisted Static Analysis for Detecting Security Vulnerabilities
Ziyang Li
Saikat Dutta
Mayur Naik
125
55
0
27 May 2024
A Survey of Source Code Representations for Machine Learning-Based Cybersecurity Tasks
A Survey of Source Code Representations for Machine Learning-Based Cybersecurity Tasks
B.K. Casey
Joanna C. S. Santos
George Perry
93
5
0
15 Mar 2024
$μ$VulDeePecker: A Deep Learning-Based System for Multiclass
  Vulnerability Detection
μμμVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection
Deqing Zou
Sujuan Wang
Shouhuai Xu
Zhen Li
Hai Jin
61
161
0
08 Jan 2020
Devign: Effective Vulnerability Identification by Learning Comprehensive
  Program Semantics via Graph Neural Networks
Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks
Yaqin Zhou
Shangqing Liu
J. Siow
Xiaoning Du
Yang Liu
GNN
82
784
0
08 Sep 2019
SySeVR: A Framework for Using Deep Learning to Detect Software
  Vulnerabilities
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities
Zerui Li
Deqing Zou
Shouhuai Xu
Hai Jin
Yawei Zhu
Zhaoxuan Chen
94
520
0
18 Jul 2018
Automated Vulnerability Detection in Source Code Using Deep
  Representation Learning
Automated Vulnerability Detection in Source Code Using Deep Representation Learning
Rebecca L. Russell
Louis Y. Kim
Lei H. Hamilton
Tomo Lazovich
Jacob A. Harer
Onur Ozdemir
Paul M. Ellingwood
M. McConley
74
536
0
11 Jul 2018
Automated software vulnerability detection with machine learning
Automated software vulnerability detection with machine learning
Jacob A. Harer
Louis Y. Kim
Rebecca L. Russell
Onur Ozdemir
Leonard Kosta
...
Alan Mackay
M. McConley
J. M. Opper
Peter Chin
Tomo Lazovich
74
166
0
14 Feb 2018
TensorFlow: A system for large-scale machine learning
TensorFlow: A system for large-scale machine learning
Martín Abadi
P. Barham
Jianmin Chen
Zhiwen Chen
Andy Davis
...
Vijay Vasudevan
Pete Warden
Martin Wicke
Yuan Yu
Xiaoqiang Zhang
GNNAI4CE
435
18,361
0
27 May 2016
Adam: A Method for Stochastic Optimization
Adam: A Method for Stochastic Optimization
Diederik P. Kingma
Jimmy Ba
ODL
2.2K
150,501
0
22 Dec 2014
On the Properties of Neural Machine Translation: Encoder-Decoder
  Approaches
On the Properties of Neural Machine Translation: Encoder-Decoder Approaches
Kyunghyun Cho
B. V. Merrienboer
Dzmitry Bahdanau
Yoshua Bengio
AI4CEAIMat
272
6,793
0
03 Sep 2014
SMOTE: Synthetic Minority Over-sampling Technique
SMOTE: Synthetic Minority Over-sampling Technique
Nitesh Chawla
Kevin W. Bowyer
Lawrence Hall
W. Kegelmeyer
AI4TS
390
25,752
0
09 Jun 2011
1