Author of the publication

ASTER: Automatic Speech Recognition System Accessibility Testing for Stutterers.

, , , , , , , , , and . ASE, page 510-521. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Motion Control for Multiple Mobile Robots Using Discrete-Event Systems and Model Predictive Control., , , , , , and . IEEE Trans. Syst. Man Cybern. Syst., 54 (2): 997-1010 (February 2024)VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder., , , , , , , and . CoRR, (2022)PentestGPT: An LLM-empowered Automatic Penetration Testing Tool., , , , , , , , , and . CoRR, (2023)LLM Jailbreak Attack versus Defense Techniques - A Comprehensive Study., , , , and . CoRR, (2024)The Threat of Offensive AI to Organizations., , , , , , , , , and . CoRR, (2021)SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View., , , , , and . EuroS&P, page 1082-1100. IEEE, (2023)Morest: Model-based RESTful API Testing with Execution Feedback., , , , , , , , and . ICSE, page 1406-1417. ACM, (2022)PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG)., , , , , , and . ICSE, page 64:1-64:12. ACM, (2024)SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View., , , , , , and . CoRR, (2022)Automatic Code Summarization via ChatGPT: How Far Are We?, , , , , , , , , and 3 other author(s). CoRR, (2023)