Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reconstruction and Membership Inference Attacks against Generative Models., , and . CoRR, (2019)PAVUDI: Patch-based Vulnerability Discovery using Machine Learning., , , and . ACSAC, page 704-717. ACM, (2023)Detecting Backdoors in Collaboration Graphs of Software Repositories., , , and . CODASPY, page 189-200. ACM, (2023)Hunting for Truth: Analyzing Explanation Methods in Learning-based Vulnerability Discovery., , , and . EuroS&P, page 524-541. IEEE, (2023)Experiences and observations on the industrial implementation of a system to search over outsourced encrypted data., , , , , , , and . Sicherheit, volume P-228 of LNI, page 115-125. GI, (2014)CodeGraphSMOTE - Data Augmentation for Vulnerability Discovery., , , and . DBSec, volume 13942 of Lecture Notes in Computer Science, page 282-301. Springer, (2023)Monte Carlo and Reconstruction Membership Inference Attacks against Generative Models., , and . Proc. Priv. Enhancing Technol., 2019 (4): 232-249 (2019)Explaining Graph Neural Networks for Vulnerability Discovery., , , and . AISec@CCS, page 145-156. ACM, (2021)Broken Promises: Measuring Confounding Effects in Learning-based Vulnerability Discovery., , , , , and . AISec@CCS, page 149-160. ACM, (2023)