Author of the publication

Dataset Characteristics for Reliable Code Authorship Attribution.

, , , , and . IEEE Trans. Dependable Secur. Comput., 20 (1): 506-521 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hiding Software Watermarks in Loop Structures., , and . SAS, volume 5079 of Lecture Notes in Computer Science, page 174-188. Springer, (2008)The Grand Challenge in Metamorphic Analysis.. ICISTM, volume 285 of Communications in Computer and Information Science, page 439-444. Springer, (2012)A deep learning approach to program similarity., , and . MASES@ASE, page 26-35. ACM, (2018)Completeness Refinement in Abstract Symbolic Trajectory Evaluation.. SAS, volume 3148 of Lecture Notes in Computer Science, page 38-52. Springer, (2004)On-chip system call tracing: A feasibility study and open prototype., , , , and . CNS, page 73-81. IEEE, (2016)Opaque Predicates Detection by Abstract Interpretation., , , and . AMAST, volume 4019 of Lecture Notes in Computer Science, page 81-95. Springer, (2006)Monotonicity and the Precision of Program Analysis., , , and . Proc. ACM Program. Lang., 8 (POPL): 1629-1662 (January 2024)Active Android malware analysis: an approach based on stochastic games., , , , and . SSPREW@ACSAC, page 5:1-5:10. ACM, (2016)Formal Framework for Reasoning About the Precision of Dynamic Analysis., , and . SAS, volume 12389 of Lecture Notes in Computer Science, page 178-199. Springer, (2020)Software Watermarking: A Semantics-based Approach., and . NSAD@SAS, volume 331 of Electronic Notes in Theoretical Computer Science, page 71-85. Elsevier, (2016)