From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A general approach to enhance the survivability of backdoor attacks by decision path coupling., , , , и . CoRR, (2024)Loopster: static loop termination analysis., , , , , и . ESEC/SIGSOFT FSE, стр. 84-94. ACM, (2017)Proteus: computing disjunctive loop summary via path dependency analysis., , , , и . SIGSOFT FSE, стр. 61-72. ACM, (2016)An Empirical Study on Dynamic Typing Related Practices in Python Systems., , , , , и . ICPC, стр. 83-93. ACM, (2020)BugMiner: Automating Precise Bug Dataset Construction by Code Evolution History Mining., , , , , , , и . ASE, стр. 1919-1929. IEEE, (2023)Are your sites down? Requirements-driven self-tuning for the survivability of Web systems., , , и . RE, стр. 219-228. IEEE Computer Society, (2011)Leopard: identifying vulnerable code for vulnerability assessment through program metrics., , , , , , и . ICSE, стр. 60-71. IEEE / ACM, (2019)Vul-RAG: Enhancing LLM-based Vulnerability Detection via Knowledge-level RAG., , , , , , , , , и . CoRR, (2024)Understanding the Complexity and Its Impact on Testing in ML-Enabled Systems., , , , , и . CoRR, (2023)MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures., , , , , , , , , и 1 other автор(ы). USENIX Security Symposium, стр. 1165-1182. USENIX Association, (2020)