Author of the publication

Software Composition Analysis for Vulnerability Detection: An Empirical Study on Java Projects.

, , , , , , , and . ESEC/SIGSOFT FSE, page 960-972. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An enhanced handover authentication solution for 6LoWPAN networks., , and . Comput. Secur., (2021)Performance and Security Enhancements to Fast Initial Link Setup in IEEE 802.11ah Wireless Networks., and . ICC Workshops, page 1-6. IEEE, (2018)FKR: An efficient authentication scheme for IEEE 802.11ah networks., and . Comput. Secur., (2020)LLM4Vuln: A Unified Evaluation Framework for Decoupling and Enhancing LLMs' Vulnerability Reasoning., , , , , , , and . CoRR, (2024)Software Composition Analysis for Vulnerability Detection: An Empirical Study on Java Projects., , , , , , , and . ESEC/SIGSOFT FSE, page 960-972. ACM, (2023)Has My Release Disobeyed Semantic Versioning? Static Detection Based on Semantic Differencing., , , , , , and . ASE, page 51:1-51:12. ACM, (2022)Empirical Analysis of Vulnerabilities Life Cycle in Golang Ecosystem., , , , , and . CoRR, (2024)ACFIX: Guiding LLMs with Mined Common RBAC Practices for Context-Aware Repair of Access Control Vulnerabilities in Smart Contracts., , , , , , and . CoRR, (2024)OSSFP: Precise and Scalable C/C++ Third-Party Library Detection using Fingerprinting Functions., , , , , , , , and . ICSE, page 270-282. IEEE, (2023)Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java Projects., , , , , , , and . ICSE, page 2540-2552. IEEE, (2023)