Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mind Your Data! Hiding Backdoors in Offline Reinforcement Learning Datasets., , , , , , , , , and . CoRR, (2022)CCBERT: Self-Supervised Code Change Representation Learning., , , , , and . ICSME, page 182-193. IEEE, (2023)Optimal formation control and collision avoidance in environment with multiple rectangle obstacles., , , , and . J. Frankl. Inst., 355 (15): 7626-7642 (2018)Formation control of networked multi-agent systems based on a novel event-triggered transmission strategy., , and . Int. J. Autom. Control., 11 (4): 447-461 (2017)APIDocBooster: An Extract-Then-Abstract Framework Leveraging Large Language Models for Augmenting API Documentation., , , , , , , and . CoRR, (2023)Towards Smaller, Faster, and Greener Language Models of Code., , , , , and . CoRR, (2023)Generation-based Code Review Automation: How Far Are Weƒ., , , , , and . ICPC, page 215-226. IEEE, (2023)Consensus formation on heterogeneous networks., , , and . EPJ Data Sci., 11 (1): 34 (2022)Stealthy Backdoor Attack for Code Models., , , , , , and . IEEE Trans. Software Eng., 50 (4): 721-741 (April 2024)Curiosity-Driven Testing for Sequential Decision-Making Process., , , , , , , and . ICSE, page 165:1-165:14. ACM, (2024)