Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fex: Assisted Identification of Domain Features from C Programs., , and . SCAM, page 170-180. IEEE, (2021)Copy and paste redeemed., and . Software Engineering, volume P-252 of LNI, page 61-62. GI, (2016)jGuard: Programming Misuse-Resilient APIs., , , and . SLE, page 161-174. ACM, (2022)Evaluating and improving transformers pre-trained on ASTs for Code Completion., , and . SANER, page 834-844. IEEE, (2023)Exploring the use of static and dynamic analysis to improve the performance of the mining sandbox approach for android malware identification., , , , , , , and . J. Syst. Softw., (2022)Dealing with Variability in API Misuse Specification., , , , and . ECOOP, volume 194 of LIPIcs, page 19:1-19:27. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)To Fix or Not to Fix: A Critical Study of Crypto-misuses in the Wild., , , , and . TrustCom, page 315-322. IEEE, (2022)Towards Trustworthy AI Software Development Assistance., , and . NIER@ICSE, page 112-116. ACM, (2024)Exploring the Use of Static and Dynamic Analysis to Improve the Performance of the Mining Sandbox Approach for Android Malware Identification., , , , , , , and . CoRR, (2021)BRAID: an API recommender supporting implicit user feedback., , , , , and . ESEC/SIGSOFT FSE, page 1510-1514. ACM, (2021)