Author of the publication

Software Composition Analysis for Vulnerability Detection: An Empirical Study on Java Projects.

, , , , , , , and . ESEC/SIGSOFT FSE, page 960-972. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Accurate and Scalable Cross-Architecture Cross-OS Binary Code Search with Emulation., , , and . IEEE Trans. Software Eng., 45 (11): 1125-1149 (2019)VIVA: Binary Level Vulnerability Identification via Partial Signature., , , , , , , , , and . SANER, page 213-224. IEEE, (2021)Source Code and Binary Level Vulnerability Detection and Hot Patching.. ASE, page 1397-1399. IEEE, (2020)Service Pattern Optimization: Focusing on Collaboration in Service Ecosystems., , , , , and . IEEE Trans. Serv. Comput., 16 (6): 3958-3971 (November 2023)Jailbreaking ChatGPT via Prompt Engineering: An Empirical Study., , , , , , , , and . CoRR, (2023)Enhancing OSS Patch Backporting with Semantics., , , , , and . CCS, page 2366-2380. ACM, (2023)Has My Release Disobeyed Semantic Versioning? Static Detection Based on Semantic Differencing., , , , , , and . ASE, page 51:1-51:12. ACM, (2022)Software Architecture Recovery with Information Fusion., , , , , , and . ESEC/SIGSOFT FSE, page 1535-1547. ACM, (2023)Software Composition Analysis for Vulnerability Detection: An Empirical Study on Java Projects., , , , , , , and . ESEC/SIGSOFT FSE, page 960-972. ACM, (2023)An empirical study of attack-related events in DeFi projects development., , , , , , and . Empir. Softw. Eng., 29 (2): 49 (April 2024)