Author of the publication

Repairing Security Vulnerabilities Using Pre-trained Programming Language Models.

, , , , , and . DSN Workshops, page 111-116. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling and Throughput Analysis for Wireless Ad Hoc Networks., , , and . VTC Spring, page 88-92. IEEE, (2008)RankGene: identification of diagnostic genes based on expression data., , , , and . Bioinform., 19 (12): 1578-1579 (2003)Reference-Guided Large-Scale Face Inpainting With Identity and Texture Control., , and . IEEE Trans. Circuits Syst. Video Technol., 33 (10): 5498-5509 (October 2023)Enhancing OSS Patch Backporting with Semantics., , , , , and . CCS, page 2366-2380. ACM, (2023)Hardware Tripartite Synapse Architecture based on Stochastic Computing., , , , and . TASE, page 81-85. IEEE, (2019)Hash Hardware Generator Based on Mutual Perturbed Logistic Map., , , , and . HPCC/SmartCity/DSS, page 353-358. IEEE, (2019)USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs., , , and . USENIX Security Symposium, page 1145-1161. USENIX Association, (2017)Leaving Your Things Unattended is No Joke! Memory Bus Snooping and Open Debug Interface Exploits., and . PerCom Workshops, page 643-648. IEEE, (2022)Joint Node and Resource Scheduling Strategy for the Distributed MIMO Radar Network Target Tracking via Convex Programming., , , and . IGARSS, page 4098-4101. IEEE, (2022)Collaborative Resource Allocation and Beampattern Optimization for Maneuvering Targets Tracking with Distributed Radar Network., , , and . IGARSS, page 7669-7672. IEEE, (2022)