Author of the publication

API-Knowledge Aware Search-Based Software Testing: Where, What, and How.

, , , , , and . ESEC/SIGSOFT FSE, page 1320-1332. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Joint Prediction of Multiple Vulnerability Characteristics Through Multi-Task Learning., , , , and . ICECCS, page 31-40. IEEE, (2019)Refactoring Detection based on UMLDiff Change-Facts Queries, and . page 263--274. IEEE Press, (2003)Mining Technology Landscape from Stack Overflow., and . ESEM, page 14:1-14:10. ACM, (2016)Towards a roadmap on software engineering for responsible AI., , , , and . CAIN, page 101-112. ACM, (2022)Investigating the Effect of Lexical Segmentation in Transformer-based Models on Medical Datasets., , and . ALTA, page 165-171. Australasian Language Technology Association, (2019)Prediction of Vulnerability Characteristics Based on Vulnerability Description and Prompt Learning., , , , and . SANER, page 604-615. IEEE, (2023)Video2Action: Reducing Human Interactions in Action Annotation of App Tutorial Videos., , and . UIST, page 16:1-16:15. ACM, (2023)Unveiling the Tricks: Automated Detection of Dark Patterns in Mobile Applications., , , , , , and . UIST, page 114:1-114:20. ACM, (2023)API-Misuse Detection Driven by Fine-Grained API-Constraint Knowledge Graph., , , , , , and . ASE, page 461-472. IEEE, (2020)Generating Concept based API Element Comparison Using a Knowledge Graph., , , , , and . ASE, page 834-845. IEEE, (2020)