Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting Token and Path-based Representations of Code for Identifying Security-Relevant Commits., , , , , , and . CoRR, (2019)Declarative Access Control for Aggregations of Multiple Ownership Data., , and . SACMAT, page 59-70. ACM, (2020)Model-Based Feature Augmentation for Cardiac Ablation Target Learning From Images., , , , , and . IEEE Trans. Biomed. Eng., 66 (1): 30-40 (2019)Known Vulnerabilities of Open Source Projects: Where Are the Fixes?, , , , , , , , , and 4 other author(s). IEEE Secur. Priv., 22 (2): 49-59 (March 2024)Commit2Vec: Learning Distributed Representations of Code Changes., , , and . SN Comput. Sci., 2 (3): 150 (2021)Commit2Vec: Learning Distributed Representations of Code Changes., , , and . CoRR, (2019)Detecting Security Fixes in Open-Source Repositories using Static Code Analyzers., , , , and . CoRR, (2021)Fine-tuned convolutional neural nets for cardiac MRI acquisition plane recognition., , , , and . Comput. methods Biomech. Biomed. Eng. Imaging Vis., 5 (5): 339-349 (2017)Sociocultural Influences for Password Definition: An AI-based Study., , and . ICISSP, page 542-549. SCITEPRESS, (2021)An Approach to Generate Realistic HTTP Parameters for Application Layer Deception., , and . ACNS, volume 13269 of Lecture Notes in Computer Science, page 337-355. Springer, (2022)