Author of the publication

CLORIFI: software vulnerability discovery using code clone verification.

, , , and . Concurr. Comput. Pract. Exp., 28 (6): 1900-1917 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intelligent Recognition of Coastal Outfall Drainage Based on Sentinel-2/MSI Imagery., , , , , and . Remote. Sens., 16 (2): 423 (January 2024)A Markov random field model for network-based analysis of genomic data., and . Bioinform., 23 (12): 1537-1544 (2007)Transfer Learning with Random Coefficient Ridge Regression., and . CoRR, (2023)Transfer Learning for Contextual Multi-armed Bandits., , and . CoRR, (2022)MiRKAT: kernel machine regression-based global association tests for the microbiome., , , , , , , , and . Bioinform., 37 (11): 1595-1597 (2021)Software Vulnerability Detection Using Backward Trace Analysis and Symbolic Execution., , , and . ARES, page 446-454. IEEE Computer Society, (2013)Inertial space tracking for free-floating space robot manipulator using RBF-NN based compensating control algorithm., , and . ROBIO, page 756-760. IEEE, (2011)Entropy analysis to classify unknown packing algorithms for malware detection., , , , and . Int. J. Inf. Sec., 16 (3): 227-248 (2017)Integrative genomics identifies LMO1 as a neuroblastoma oncogene, , , , , , , , , and 23 other author(s). Nature, 469 (7329): 216--220 (December 2010)An Integrated Gaussian Graphical Model to evaluate the impact of exposures on metabolic networks., , , , , , , and . Comput. Biol. Medicine, (2019)