Author of the publication

Leopard: identifying vulnerable code for vulnerability assessment through program metrics.

, , , , , , and . ICSE, page 60-71. IEEE / ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guardauto: A Decentralized Runtime Protection System for Autonomous Driving., , , , , and . IEEE Trans. Computers, 70 (10): 1569-1581 (2021)Identifying change patterns of API misuses from code changes., , , , and . Sci. China Inf. Sci., (2021)DeepLink: Recovering issue-commit links based on deep learning., , , and . J. Syst. Softw., (2019)Interactive, effort-aware library version harmonization., , , , , and . ESEC/SIGSOFT FSE, page 518-529. ACM, (2020)Survivability-oriented self-tuning of web systems., , , and . WWW (Companion Volume), page 23-24. ACM, (2011)Characterizing the Complexity and Its Impact on Testing in ML-Enabled Systems : A Case Sutdy on Rasa., , , , , , and . ICSME, page 258-270. IEEE, (2023)Superion: grammar-aware greybox fuzzing., , , and . ICSE, page 724-735. IEEE / ACM, (2019)Exploring the Potential of ChatGPT in Automated Code Refinement: An Empirical Study., , , , , , and . ICSE, page 34:1-34:13. ACM, (2024)Demystifying the Vulnerability Propagation and Its Evolution via Dependency Trees in the NPM Ecosystem., , , , , and . ICSE, page 672-684. ACM, (2022)Blockchain-Based Implementation for Financial Product Management., , and . ITNAC, page 1-3. IEEE Computer Society, (2018)