From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

How Android developers handle evolution-induced API compatibility issues: a large-scale study., , , , , , , , , и 1 other автор(ы). ICSE, стр. 886-898. ACM, (2020)An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem., , , , , и . USENIX Security Symposium, стр. 2793-2810. USENIX Association, (2020)Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity Analysis., , , , и . USENIX Security Symposium, стр. 3989-4006. USENIX Association, (2022)ORDER: Object centRic DEterministic Replay for Java., , , , и . USENIX ATC, USENIX Association, (2011)NestFuzz: Enhancing Fuzzing with Comprehensive Understanding of Input Processing Logic., , , , , , и . CCS, стр. 1272-1286. ACM, (2023)BScout: Direct Whole Patch Presence Test for Java Executables., , , , , , , , , и . USENIX Security Symposium, стр. 1147-1164. USENIX Association, (2020)An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications., , , , , , , , и . USENIX Security Symposium, стр. 1183-1198. USENIX Association, (2018)Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths., , , , , , и . USENIX Security Symposium, стр. 4365-4382. USENIX Association, (2022)PDiff: Semantic-based Patch Presence Testing for Downstream Kernels., , , , , , , , и . CCS, стр. 1149-1163. ACM, (2020)How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World., , , , , , , , , и . ACM Conference on Computer and Communications Security, стр. 1701-1713. ACM, (2018)