Author of the publication

ALPHAPROG: Reinforcement Generation of Valid Programs for Compiler Fuzzing.

, , , , and . AAAI, page 12559-12565. AAAI Press, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adversarially Reprogramming Pretrained Neural Networks for Data-limited and Cost-efficient Malware Detection., , and . SDM, page 693-701. SIAM, (2022)Enhancing vulnerability detection via AST decomposition and neural sub-tree encoding., , , , and . Expert Syst. Appl., 238 (Part B): 121865 (March 2024)Adversary for Social Good: Leveraging Adversarial Attacks to Protect Personal Attribute Privacy., , and . ACM Trans. Knowl. Discov. Data, 18 (2): 46:1-46:24 (February 2024)Watermarking-based Defense against Adversarial Attacks on Deep Neural Networks., , , , and . IJCNN, page 1-8. IEEE, (2021)iTrustSO: an intelligent system for automatic detection of insecure code snippets in stack overflow., , , , , and . ASONAM, page 1097-1104. ACM, (2019)Automatic Detection of Helmet Uses for Construction Safety., , , , , , and . WI Workshops, page 135-142. IEEE Computer Society, (2016)Code Execution Capability as a Metric for Machine Learning-Assisted Software Vulnerability Detection Models., , and . TrustCom, page 1606-1613. IEEE, (2023)CVII: Enhancing Interpretability in Intelligent Sensor Systems via Computer Vision Interpretability Index., , and . Sensors, 23 (24): 9893 (December 2023)A coherence-improved and mass-balanced inflow turbulence generation method for large eddy simulation., , , , and . J. Comput. Phys., (February 2024)AiDroid: When Heterogeneous Information Network Marries Deep Neural Network for Real-time Android Malware Detection., , , , , , , and . CoRR, (2018)