Author of the publication

Software Composition Analysis for Vulnerability Detection: An Empirical Study on Java Projects.

, , , , , , , and . ESEC/SIGSOFT FSE, page 960-972. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

3D Aerial Vehicle Base Station (UAV-BS) Position Planning based on Deep Q-Learning for Capacity Enhancement of Users With Different QoS Requirements., , , , , , and . IWCMC, page 1508-1512. IEEE, (2019)On the preferences of quality indicators for multi-objective search algorithms in search-based software engineering., , , , and . Empir. Softw. Eng., 27 (6): 144 (2022)Predicting Perceived Level of Cycling Safety for Cycling Trips., , and . SIGSPATIAL/GIS, page 456-459. ACM, (2019)MagicPhone: pointing & interacting., , , , and . UbiComp (Adjunct Papers), page 451-452. ACM, (2010)Reality Bites: Assessing the Realism of Driving Scenarios with Large Language Models., , , , and . FORGE, page 40-51. ACM, (2024)Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation., , and . Signal Process., (2018)A Chaotic Image Encryption Scheme Based on Hénon-Chebyshev Modulation Map and Genetic Operations., , , and . Int. J. Bifurc. Chaos, 30 (6): 2050090:1-2050090:22 (2020)Privacy-preserving self-serviced medical diagnosis scheme based on secure multi-party computation., , , , and . Comput. Secur., (2020)Privacy Protection and Secure Transmission of Smart Meter Data., , , , and . ISMICT, page 173-178. IEEE, (2021)DeepCAC: a deep learning approach on DNA transcription factors classification based on multi-head self-attention and concatenate convolutional neural network., , , , and . BMC Bioinform., 24 (1): 345 (December 2023)