Author of the publication

You see what I want you to see: poisoning vulnerabilities in neural code search.

, , , , , , , and . ESEC/SIGSOFT FSE, page 1233-1245. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proportional Allocation of Resources on Shared Ring Buffer for Virtualization., , and . IJCAC, 2 (2): 12-30 (2012)Are a Few Neighboring Peers Good Enough?, , , , and . GLOBECOM, page 1-5. IEEE, (2010)Performance Effect Analysis of False Sharing Problem in Clusters with Single I/O Space., and . PDPTA, page 2788-2794. CSREA Press, (1999)A Tool to Detect Performance Problems of Multi-threaded Programs on NUMA Systems., , and . Trustcom/BigDataSE/ISPA, page 1145-1152. IEEE, (2016)PerfDoc: Automatic Performance Bug Diagnosis in Production Cloud Computing Infrastructures., , , and . Trustcom/BigDataSE/ISPA, page 683-690. IEEE, (2016)Multi-path based Algorithms for Data Transfer in the Grid Environment., , , and . New Generation Comput., 28 (2): 129-136 (2010)A Concurrent Optimization Consensus System Based on Blockchain., , , and . ICT, page 244-248. IEEE, (2019)Stochastic Analysis on Fog Computing Empowered Mobile Crowdsensing with D2D Communications., , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 656-663. IEEE, (2018)BlockP2P: Enabling Fast Blockchain Broadcast with Scalable Peer-to-Peer Network Topology., , , , , , , and . GPC, volume 11484 of Lecture Notes in Computer Science, page 223-237. Springer, (2019)Privacy-Preserving Image Retrieval in IoT-Cloud., , , , , , and . Trustcom/BigDataSE/ISPA, page 799-806. IEEE, (2016)