Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors., , , , , , , and . CoRR, (2024)An Empirical Study of Pre-Trained Model Reuse in the Hugging Face Deep Learning Model Registry., , , , , , , and . ICSE, page 2463-2475. IEEE, (2023)PTMTorrent: A Dataset for Mining Open-source Pre-trained Model Packages., , , , , , , and . MSR, page 57-61. IEEE, (2023)Reusing Deep Learning Models: Challenges and Directions in Software Engineering., , , , , and . JVA, page 17-30. IEEE, (2023)An Empirical Study on Using Large Language Models to Analyze Software Supply Chain Security Failures., , , , and . SCORED@CCS, page 5-15. ACM, (2023)An Empirical Study of Artifacts and Security Risks in the Pre-trained Model Supply Chain., , , , , , , and . SCORED@CCS, page 105-114. ACM, (2022)SoK: Analysis of Software Supply Chain Security by Establishing Secure Design Properties., , , and . SCORED@CCS, page 15-24. ACM, (2022)Reflecting on the Use of the Policy-Process-Product Theory in Empirical Software Engineering., , , , , and . ESEC/SIGSOFT FSE, page 2112-2116. ACM, (2023)