Author of the publication

You see what I want you to see: poisoning vulnerabilities in neural code search.

, , , , , , , and . ESEC/SIGSOFT FSE, page 1233-1245. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interactive Traceability Links Visualization using Hierarchical Trace Map., , and . ICSME, page 367-369. IEEE, (2019)Value-Flow-Based Demand-Driven Pointer Analysis for C and C++., and . IEEE Trans. Software Eng., 46 (8): 812-835 (2020)A Comparative Study of Class Rebalancing Methods for Security Bug Report Classification., , , , , and . IEEE Trans. Reliab., 70 (4): 1658-1670 (2021)Recursive State Machine Guided Graph Folding for Context-Free Language Reachability., , , and . Proc. ACM Program. Lang., 7 (PLDI): 318-342 (2023)New Challenges in Reinforcement Learning: A Survey of Security and Privacy., , , , , and . CoRR, (2023)Challenging Machine Learning-based Clone Detectors via Semantic-preserving Code Transformations., , , , , and . CoRR, (2021)Secure Metric Learning via Differential Pairwise Privacy., , , and . IEEE Trans. Inf. Forensics Secur., (2020)Demystifying the underground ecosystem of account registration bots., , , , , and . ESEC/SIGSOFT FSE, page 897-909. ACM, (2022)Enhancing Traceability Link Recovery with Unlabeled Data., , , and . ISSRE, page 446-457. IEEE, (2022)Typestate-guided fuzzer for discovering use-after-free vulnerabilities., , , , , , , , and . ICSE, page 999-1010. ACM, (2020)