Author of the publication

Towards understanding an open-source bounty: Analysis of Bountysource.

, , , and . SANER, page 577-578. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effective Graph-Neural-Network based Models for Discovering Structural Hole Spanners in Large-Scale and Diverse Networks., , , and . CoRR, (2023)Multi-document Summarization via Deep Learning Techniques: A Survey., , , , and . CoRR, (2020)Worst-Case VCG Redistribution Mechanism Design Based on the Lottery Ticket Hypothesis.. AAAI, page 9740-9748. AAAI Press, (2024)Discovering Structural Hole Spanners in Dynamic Networks via Graph Neural Networks., , , and . WI/IAT, page 64-71. IEEE, (2022)Deep False-Name-Proof Auction Mechanisms., , , and . PRIMA, volume 11873 of Lecture Notes in Computer Science, page 594-601. Springer, (2019)TTFDNet: Precise Depth Estimation from Single-Frame Fringe Patterns., , , , , , , , and . Sensors, 24 (14): 4733 (July 2024)Multi-Forgery Detection Challenge 2022: Push the Frontier of Unconstrained and Diverse Forgery Detection., , , , , , , , , and 5 other author(s). CoRR, (2022)Scalable Edge Blocking Algorithms for Defending Active Directory Style Attack Graphs., , , , and . AAAI, page 5649-5656. AAAI Press, (2023)Optimal sizing and scheduling of community battery storage within a local market., , , , , , and . e-Energy, page 34-46. ACM, (2022)A Scalable Double Oracle Algorithm for Hardening Large Active Directory Systems., , , and . AsiaCCS, page 993-1003. ACM, (2023)