Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Synthesizing Coupling Proofs of Differential Privacy., and . CoRR, (2017)Proving Data-Poisoning Robustness in Decision Trees., , and . Commun. ACM, 66 (2): 105-113 (February 2023)Effectively Propositional Interpolants., and . CAV (2), volume 9780 of Lecture Notes in Computer Science, page 210-229. Springer, (2016)Efficient Synthesis with Probabilistic Constraints., , and . CAV (1), volume 11561 of Lecture Notes in Computer Science, page 278-296. Springer, (2019)Semantic Robustness of Models of Source Code., , , , , and . SANER, page 526-537. IEEE, (2022)AutoWS-Bench-101: Benchmarking Automated Weak Supervision with 100 Labels., , , , , , , , , and . NeurIPS, (2022)Certified Robustness to Programmable Transformations in LSTMs., , and . EMNLP (1), page 1068-1083. Association for Computational Linguistics, (2021)The Dataset Multiplicity Problem: How Unreliable Data Impacts Predictions., , and . FAccT, page 193-204. ACM, (2023)Maximal specification synthesis., , and . POPL, page 789-801. ACM, (2016)Ufo: A Framework for Abstraction- and Interpolation-Based Software Verification., , , and . CAV, volume 7358 of Lecture Notes in Computer Science, page 672-678. Springer, (2012)