From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Orchestrated Empirical Study on Deep Learning Frameworks and Platforms., , , , , , , , и . CoRR, (2018)TransRepair: Context-aware Program Repair for Compilation Errors., , , , , , и . ASE, стр. 108:1-108:13. ACM, (2022)SeqAdver: Automatic Payload Construction and Injection in Sequence-based Android Adversarial Attack., , , , и . ICDM (Workshops), стр. 1342-1351. IEEE, (2023)Automatic Verification for Later-Correspondence of Security Protocols., , , , , и . SOFL+MSVL, том 8979 из Lecture Notes in Computer Science, стр. 111-126. Springer, (2014)Automatic Detection and Analysis towards Malicious Behavior in IoT Malware., , , , и . ICDM (Workshops), стр. 1332-1341. IEEE, (2023)A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices., , , , , и . IEEE Trans. Inf. Forensics Secur., (2021)Registration of multitemporal GF-1 remote sensing images with weighting perspective transformation model., , , и . ICIP, стр. 2264-2268. IEEE, (2017)FT2Ra: A Fine-Tuning-Inspired Approach to Retrieval-Augmented Code Completion., , , , , , , , и . CoRR, (2024)Enhancing Code Vulnerability Detection via Vulnerability-Preserving Data Augmentation., , , , , и . CoRR, (2024)A Comprehensive Study on Quality Assurance Tools for Java., , , , , , , , и . ISSTA, стр. 285-297. ACM, (2023)