Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rule-Based Testing of Neural Networks., , , and . SE4SafeML@SIGSOFT FSE, page 1-5. ACM, (2023)NEUROSPF: A Tool for the Symbolic Analysis of Neural Networks., , , , and . ICSE (Companion Volume), page 25-28. IEEE, (2021)DifFuzz: differential fuzzing for side-channel analysis., , and . ICSE, page 176-187. IEEE / ACM, (2019)On reliability of patch correctness assessment., , , , , and . ICSE, page 524-535. IEEE / ACM, (2019)Symbolic execution with mixed concrete-symbolic solving., , and . ISSTA, page 34-44. ACM, (2011)Learning Assumptions for Verifying Cryptographic Protocols Compositionally., , , and . FACS, volume 13077 of Lecture Notes in Computer Science, page 3-23. Springer, (2021)SECOM: Towards a convention for security commit messages., , , and . MSR, page 764-765. ACM, (2022)Exact and approximate probabilistic symbolic execution for nondeterministic programs., , , , and . ASE, page 575-586. ACM, (2014)Test input generation for red-black trees using abstraction., , and . ASE, page 414-417. ACM, (2005)Symbolic Complexity Analysis Using Context-Preserving Histories., , and . ICST, page 58-68. IEEE Computer Society, (2017)