From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Machine Learning Methods for Software Vulnerability Detection., и . IWSPA@CODASPY, стр. 31-39. ACM, (2018)Can Machines Tell Stories? A Comparative Study of Deep Neural Language Models and Metrics., и . IEEE Access, (2020)Combining Syntax and Semantics for Automatic Extractive Single-Document Summarization., и . CICLing (2), том 7182 из Lecture Notes in Computer Science, стр. 366-377. Springer, (2012)Mining the Web for Collocations: IR Models of Term Associations., , , , , , и . CICLing (1), том 9623 из Lecture Notes in Computer Science, стр. 177-194. Springer, (2016)RPO Constraint Solving Is in NP., , и . CSL, том 1584 из Lecture Notes in Computer Science, стр. 385-398. Springer, (1998)Software Vulnerability Detection via Multimodal Deep Learning., и . STM, том 13867 из Lecture Notes in Computer Science, стр. 85-103. Springer, (2022)A visual and interactive automata theory course emphasizing breadth of automata.. ITiCSE, стр. 325-329. ACM, (2005)University of Houston @ CL-SciSumm 2017: Positional language Models, Structural Correspondence Learning and Textual Entailment., , , и . BIRNDL@SIGIR (2), том 2002 из CEUR Workshop Proceedings, стр. 73-85. CEUR-WS.org, (2017)Vulnerability Detection via Multimodal Learning: Datasets and Analysis., и . AsiaCCS, стр. 1225-1227. ACM, (2022)Detecting Phishing Emails the Natural Language Way., , и . ESORICS, том 7459 из Lecture Notes in Computer Science, стр. 824-841. Springer, (2012)