From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A study on command block collection and restoration techniques through detection of project file manipulation on engineering workstation of industrial control system., , и . Digit. Investig., 40 (Supplement): 301354 (2022)A Survey of Automatic Code Generation fromNatural Language., и . J. Inf. Process. Syst., 17 (3): 537-555 (2021)Assessing Evaluation Metrics for Neural Test Oracle Generation., , , и . CoRR, (2023)Characterizing and Understanding Software Security Vulnerabilities in Machine Learning Libraries., , , , и . MSR, стр. 27-38. IEEE, (2023)A Study on the Application of Technical Assessment Methodology (TAM) for CyberSecurity in Nuclear Power Plant., , , , и . ICEA, стр. 44:1-44:7. ACM, (2020)Characterizing and Understanding Software Security Vulnerabilities in Machine Learning Libraries., , , и . CoRR, (2022)Automated Test Case Generation Using Code Models and Domain Adaptation., , , и . CoRR, (2023)An Empirical Study on the Stability of Explainable Software Defect Prediction., , , , , и . APSEC, стр. 141-150. IEEE, (2023)A Study on the Digital Forensic Method for Decentralized Web Service., , и . ICEA, стр. 37:1-37:6. ACM, (2020)Explainable Software Defect Prediction: Are We There Yet?, , , , и . CoRR, (2021)