Author of the publication

VGX: Large-Scale Sample Generation for Boosting Learning-Based Software Vulnerability Analyses.

, , , , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simultaneous Phase Unwrapping and Removal of Chemical Shift (SPURS) Using Graph Cuts: Application in Quantitative Susceptibility Mapping., , , , , , , , and . IEEE Trans. Med. Imaging, 34 (2): 531-540 (2015)PS-BC: power-saving considerations in design of buffer caches serving heterogeneous storage devices., and . ISLPED, page 295-300. ACM, (2010)Predictive thermal management for hard real-time tasks., and . SIGBED Review, 3 (1): 35-40 (2006)Semantics and Algorithms for Parametric Monitoring, and . Logical Methods in Computer Science, (2012)Temporal and Spatial Aspects of Snow Distribution in the Nam Co Basin on the Tibetan Plateau from MODIS Data., , , , and . Remote Sensing, 2 (12): 2700-2712 (2010)Distributed Join-the-Idle-Queue for Low Latency Cloud Services., , and . IEEE/ACM Trans. Netw., 26 (5): 2309-2319 (2018)Key Reconciliation with Low-Density Parity-Check Codes for Long-Distance Quantum Cryptography., , , and . CoRR, (2017)Towards an Algebraic Network Information Theory: Simultaneous Joint Typicality Decoding., , , , and . CoRR, (2019)A Joint Typicality Approach to Algebraic Network Information Theory., , , , and . CoRR, (2016)Method to Evaluate Software Protection Based on Attack Modeling., , , , , and . HPCC/EUC, page 837-844. IEEE, (2013)