Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Augmentation Approaches for Source Code Models: A Survey., , , , , , , and . CoRR, (2023)A Proactive and Dual Prevention Mechanism against Illegal Song Covers empowered by Singing Voice Conversion., , , , , and . CoRR, (2024)Learning to Prevent Profitless Neural Code Completion., , , , , and . CoRR, (2022)On the Importance of Building High-quality Training Datasets for Neural Code Search., , , , and . ICSE, page 1609-1620. ACM, (2022)CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning., , , , and . WWW, page 652-660. ACM, (2022)Towards secure and robust stateful deep learning systems with model-based analysis. Nanyang Technological University, Singapore, (2020)FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler., , , , and . USENIX Security Symposium, page 1865-1882. USENIX Association, (2023)Towards Building a Generic Vulnerability Detection Platform by Combining Scalable Attacking Surface Analysis and Directed Fuzzing.. ICFEM, volume 11232 of Lecture Notes in Computer Science, page 464-468. Springer, (2018)Vulnerability Analysis, Robustness Verification, and Mitigation Strategy for Machine Learning-Based Power System Stability Assessment Model Under Adversarial Examples., , , , , and . IEEE Trans. Smart Grid, 13 (2): 1622-1632 (2022)Pop Quiz! Do Pre-trained Code Models Possess Knowledge of Correct API Names?, , , , , , and . CoRR, (2023)