Author of the publication

SCVD: A New Semantics-Based Approach for Cloned Vulnerable Code Detection.

, , , , , , , and . DIMVA, volume 10327 of Lecture Notes in Computer Science, page 325-344. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Applying Pneumatic Gel Muscles to Augment Plantar Flexor Muscle Stretching for Children with Cerebral Palsy., , , , , , , and . AHs, page 337-340. ACM, (2022)DeLTR: A Deep Learning Based Approach to Traffic Light Recognition., , , and . ICIG (3), volume 11903 of Lecture Notes in Computer Science, page 604-615. Springer, (2019)Lidar-based vehicle detection for dynamic SLAM applications., , , , , and . ICCAIS, page 674-678. IEEE, (2021)SCVD: A New Semantics-Based Approach for Cloned Vulnerable Code Detection., , , , , , , and . DIMVA, volume 10327 of Lecture Notes in Computer Science, page 325-344. Springer, (2017)Fuzzy Immune PI Control of Networked Control System Based on ADW Time-Delay Prediction., , , and . FSKD (3), page 76-80. IEEE Computer Society, (2008)978-0-7695-3305-6.Contract type and decision right of sales promotion in supply chain management with a capital constrained retailer., , and . Eur. J. Oper. Res., 240 (2): 415-424 (2015)EDF Scheduling for Tasks with Uncertain Execution Times in Networked Control System., , , , and . ICNC (5), page 207-211. IEEE Computer Society, (2008)VisDrone-DET2018: The Vision Meets Drone Object Detection in Image Challenge Results., , , , , , , , , and 95 other author(s). ECCV Workshops (5), volume 11133 of Lecture Notes in Computer Science, page 437-468. Springer, (2018)VulDeePecker: A Deep Learning-Based System for Vulnerability Detection., , , , , , , and . NDSS, The Internet Society, (2018)