Author of the publication

VWC-BERT: Scaling Vulnerability-Weakness-Exploit Mapping on Modern AI Accelerators.

, , , , , and . IEEE Big Data, page 1224-1229. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Halappanavar, Mahantesh
add a person with the name Halappanavar, Mahantesh
 

Other publications of authors with the same name

Towards a Networks-of-Networks Framework for Cyber Security, , , , , , and . CoRR, (2013)On parallel push-relabel based algorithms for bipartite maximum matching., , , and . Parallel Comput., 40 (7): 289-308 (2014)A Network-of-Networks Model for Electrical Infrastructure Networks., , , , , and . CoRR, (2015)Challenges and Opportunities in Deep Reinforcement Learning with Graph Neural Networks: A Comprehensive review of Algorithms and Applications., , , , and . CoRR, (2022)Semi-Supervised Learning of Dynamical Systems with Neural Ordinary Differential Equations: A Teacher-Student Model Approach., , , , , , , and . CoRR, (2023)V2W-BERT: A Framework for Effective Hierarchical Multiclass Classification of Software Vulnerabilities., , , , and . DSAA, page 1-12. IEEE, (2021)Differentiable Predictive Control with Safety Guarantees: A Control Barrier Function Approach., , , , and . CDC, page 932-938. IEEE, (2022)VWC-BERT: Scaling Vulnerability-Weakness-Exploit Mapping on Modern AI Accelerators., , , , , and . IEEE Big Data, page 1224-1229. IEEE, (2022)Graph analytics for signature discovery., , , and . ISI, page 315-320. IEEE, (2013)Scalable and Memory-Efficient Algorithms for Controlling Networked Epidemic Processes Using Multiplicative Weights Update Method., , , , and . IJCAI, page 5164-5170. ijcai.org, (2022)