Author of the publication

Finding A Needle in a Haystack: Automated Mining of Silent Vulnerability Fixes.

, , , , , , and . ASE, page 705-716. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What do Programmers Discuss about Deep Learning Frameworks., , , , and . Empir. Softw. Eng., 25 (4): 2694-2747 (2020)What Do Programmers Discuss About Blockchain? A Case Study on the Use of Balanced LDA and the Reference Architecture of a Domain to Capture Online Discussions About Blockchain Platforms Across Stack Exchange Communities., , and . IEEE Trans. Software Eng., 47 (7): 1331-1349 (2021)How practitioners perceive coding proficiency., , , and . ICSE, page 924-935. IEEE / ACM, (2019)Smart Contract Security: A Practitioners' Perspective: The Artifact of a Paper Accepted in the 43rd IEEE/ACM International Conference on Software Engineering (ICSE 2021)., , , , , and . ICSE (Companion Volume), page 227-228. IEEE, (2021)Practitioners' Expectations on Automated Code Comment Generation., , , , , and . ICSE, page 1693-1705. ACM, (2022)Efficient Points-To Analysis for Partial Call Graph Construction., , , and . SEKE, page 416-421. Knowledge Systems Institute Graduate School, (2014)Smart Contract Security: a Practitioners' Perspective., , , , , and . ICSE, page 1410-1422. IEEE, (2021)Task Context: A Tool for Predicting Code Context Models for Software Development Tasks., , , and . ICSE Companion, page 156-160. IEEE, (2023)Minimum-Latency Schedulings for Group Communications in Multi-channel Multihop Wireless Networks., , , , and . WASA, volume 5682 of Lecture Notes in Computer Science, page 469-478. Springer, (2009)Mining Sandboxes for Linux Containers., , , , and . ICST, page 92-102. IEEE Computer Society, (2017)