Author of the publication

Leveraging User-Defined Identifiers for Counterfactual Data Generation in Source Code Vulnerability Detection.

, , , , and . SCAM, page 143-150. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal Analysis of QUIC Handshake Protocol Using Symbolic Model Checking., , , , , and . IEEE Access, (2021)An attention-based automatic vulnerability detection approach with GGNN., , , , , , , , and . Int. J. Mach. Learn. Cybern., 14 (9): 3113-3127 (September 2023)A Reactive Traffic Flow Estimation in Software Defined Networks., and . ICCCS, page 585-588. IEEE, (2020)A comparative study of neural network techniques for automatic software vulnerability detection., , , , , and . CoRR, (2021)Leveraging User-Defined Identifiers for Counterfactual Data Generation in Source Code Vulnerability Detection., , , , and . SCAM, page 143-150. IEEE, (2023)A Comparative Study of Neural Network Techniques for Automatic Software Vulnerability Detection., , , , , , and . TASE, page 1-8. IEEE, (2020)UAV Sensor Spoofing Detection Algorithm Based on GPS and Optical Flow Fusion., , , , and . ICCSP, page 146-151. ACM, (2020)Interpretation of Learning-Based Automatic Source Code Vulnerability Detection Model Using LIME., , , , , , , , and . KSEM, volume 12817 of Lecture Notes in Computer Science, page 275-286. Springer, (2021)An Approach of Linear Regression-Based UAV GPS Spoofing Detection., , , , , , and . Wirel. Commun. Mob. Comput., (2021)An Automatic Source Code Vulnerability Detection Approach Based on KELM., , , , , and . Secur. Commun. Networks, (2021)