Author of the publication

FuzzBoost: Reinforcement Compiler Fuzzing.

, , , , and . ICICS, volume 13407 of Lecture Notes in Computer Science, page 359-375. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing Robustness of Graph Convolutional Networks via Dropping Graph Connections., , and . ECML/PKDD (3), volume 12459 of Lecture Notes in Computer Science, page 412-428. Springer, (2020)Research on project financing modes of BOT and PPP based on case studies.. LISS, page 1-4. IEEE, (2016)Analysis of the development of housing industrialization based on system dynamics.. LISS, page 1-4. IEEE, (2016)Research of paper surface defects detection system based on blob algorithm., , and . ICIA, page 694-698. IEEE, (2013)Deterministic Scheduling in Network-on-Chip Using the Trajectory Approach., , and . ISORC, page 60-65. IEEE Computer Society, (2015)Optimizing Network Calculus for Switched Ethernet Network with Deficit Round Robin., , , and . RTSS, page 300-311. IEEE Computer Society, (2018)Integrating Offset in Worst Case Delay Analysis of Switched Ethernet Network With Deficit Round Robbin., , , and . ETFA, page 353-359. IEEE, (2018)A full functional Monolithic Active Pixel Sensor prototype for the CEPC vertex detector., , , , , , , , , and 7 other author(s). ICECS, page 510-513. IEEE, (2019)TinyKG: Memory-Efficient Training Framework for Knowledge Graph Neural Recommender Systems., , , , , , and . RecSys, page 257-267. ACM, (2022)Adversary for Social Good: Leveraging Adversarial Attacks to Protect Personal Attribute Privacy., , and . ACM Trans. Knowl. Discov. Data, 18 (2): 46:1-46:24 (February 2024)