Author of the publication

"More Than Deep Learning": post-processing for API sequence recommendation.

, , , , , , and . Empir. Softw. Eng., 27 (1): 15 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding the Complexity and Its Impact on Testing in ML-Enabled Systems., , , , , and . CoRR, (2023)A hybrid code representation learning approach for predicting method names., , , and . J. Syst. Softw., (2021)A general approach to enhance the survivability of backdoor attacks by decision path coupling., , , , and . CoRR, (2024)A Large-Scale Empirical Study of Real-Life Performance Issues in Open Source Projects., , , , and . IEEE Trans. Software Eng., 49 (2): 924-946 (February 2023)An Empirical Study on Dynamic Typing Related Practices in Python Systems., , , , , and . ICPC, page 83-93. ACM, (2020)Loopster: static loop termination analysis., , , , , and . ESEC/SIGSOFT FSE, page 84-94. ACM, (2017)Proteus: computing disjunctive loop summary via path dependency analysis., , , , and . SIGSOFT FSE, page 61-72. ACM, (2016)BugMiner: Automating Precise Bug Dataset Construction by Code Evolution History Mining., , , , , , , and . ASE, page 1919-1929. IEEE, (2023)Leopard: identifying vulnerable code for vulnerability assessment through program metrics., , , , , , and . ICSE, page 60-71. IEEE / ACM, (2019)Are your sites down? Requirements-driven self-tuning for the survivability of Web systems., , , and . RE, page 219-228. IEEE Computer Society, (2011)