From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Typestate-guided fuzzer for discovering use-after-free vulnerabilities., , , , , , , , и . ICSE, стр. 999-1010. ACM, (2020)New Challenges in Reinforcement Learning: A Survey of Security and Privacy., , , , , и . CoRR, (2023)Demystifying the underground ecosystem of account registration bots., , , , , и . ESEC/SIGSOFT FSE, стр. 897-909. ACM, (2022)Enhancing Traceability Link Recovery with Unlabeled Data., , , и . ISSRE, стр. 446-457. IEEE, (2022)Secure Metric Learning via Differential Pairwise Privacy., , , и . CoRR, (2020)Interactive Traceability Links Visualization using Hierarchical Trace Map., , и . ICSME, стр. 367-369. IEEE, (2019)Cross-Language Taint Analysis: Generating Caller-Sensitive Native Code Specification for Java., , , и . IEEE Trans. Software Eng., 50 (6): 1518-1533 (июня 2024)Context-Free Language Reachability via Skewed Tabulation., , , и . Proc. ACM Program. Lang., 8 (PLDI): 1830-1853 (2024)What Do They Capture? - A Structural Analysis of Pre-Trained Language Models for Source Code., , , , , и . ICSE, стр. 2377-2388. ACM, (2022)An Empirical Study of Code Deobfuscations on Detecting Obfuscated Android Piggybacked Apps., , , , , и . APSEC, стр. 41-50. IEEE, (2020)