Author of the publication

Repairing Intricate Faults in Code Using Machine Learning and Path Exploration.

, , , and . ICSME, page 453-457. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the probabilistic analysis of neural networks., , , and . SEAMS@ICSE, page 5-8. ACM, (2020)Parallelization Techniques for Verifying Neural Networks., , , , , , , , , and . CoRR, (2020)Case Study: Analysis of Autonomous Center Line Tracking Neural Networks., , , and . VSTTE, volume 13124 of Lecture Notes in Computer Science, page 104-121. Springer, (2021)Symbolic Execution for Importance Analysis and Adversarial Generation in Neural Networks., , , , , and . ISSRE, page 313-322. IEEE, (2019)Rule-Based Runtime Mitigation Against Poison Attacks on Neural Networks., , , and . RV, volume 13498 of Lecture Notes in Computer Science, page 67-84. Springer, (2022)MedKnowts: Unified Documentation and Information Retrieval for Electronic Health Records., , , , , and . UIST, page 1169-1183. ACM, (2021)Concept-based Analysis of Neural Networks via Vision-Language Models., , , , , , and . CoRR, (2024)Finding Invariants in Deep Neural Networks., , , and . CoRR, (2019)An overview of structural coverage metrics for testing neural networks., , , , , and . Int. J. Softw. Tools Technol. Transf., 25 (3): 393-405 (June 2023)AntidoteRT: Run-time Detection and Correction of Poison Attacks on Neural Networks., , , and . CoRR, (2022)