Author of the publication

Chain-of-Thought Prompting of Large Language Models for Discovering and Fixing Software Vulnerabilities.

, , , , , and . CoRR, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Determining common insertion sites based on retroviral insertion distribution across tumors., , and . Comput. Biol. Chem., (2014)Fast Resampling of Three-Dimensional Point Clouds via Graphs., , , , and . IEEE Trans. Signal Process., 66 (3): 666-681 (2018)Spectrum-specific encephalography standardized low-resolution brain electromagnetic tomography network and gray matter correlations in vascular dementia patients., , , , , , and . IJDSN, (2020)Nearest Neighbor Query, Definition., and . Encyclopedia of GIS, Springer, (2017)Saliency selection for robust visual tracking., , and . ICIP, page 2785-2788. IEEE, (2010)Adaptive multi-cue tracking by online appearance learning., , and . Neurocomputing, 74 (6): 1035-1045 (2011)An insight into campus network user behaviour analysis decision system., , and . Int. J. Embed. Syst., 9 (1): 3-11 (2017)A Simplification Algorithm Based On Appearance Maintenance., , , and . J. Multim., 5 (6): 629-638 (2010)Modelling of multi-timescale demand response for power markets., , , , and . Int. J. Model. Identif. Control., 33 (3): 237-245 (2019)An Algorithm to Detect the Automobiles Using the Copied Vehicle License., , , , and . CloudComp, volume 142 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 225-231. Springer, (2014)