Author of the publication

Learning to Detect Memory-related Vulnerabilities.

, , , , , , , , and . ACM Trans. Softw. Eng. Methodol., 33 (2): 43:1-43:35 (February 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MFCD-Net: Cross Attention Based Multimodal Fusion Network for DPC Imagery Cloud Detection., , , , , , , and . Remote. Sens., 14 (16): 3905 (2022)Simulation of Parallel Polarization Radiance for Retrieving Chlorophyll a Concentrations in Open Oceans Based on Spaceborne Polarization Crossfire Strategy., , , , , , , , , and . Remote. Sens., 15 (23): 5490 (December 2023)Intelligent analysis for software data: research and applications., , , and . Frontiers Inf. Technol. Electron. Eng., 23 (5): 661-663 (2022)基于Mozilla的安全性漏洞再修复经验研究 (Empirical Study of Reopened Security Bugs on Mozilla)., , , and . 计算机科学, 44 (11): 41-49 (2017)A comprehensive study on security bug characteristics., , , , , and . J. Softw. Evol. Process., (2021)Enabling Feature Location for API Method Recommendation and Usage Location., , , , and . IEEE Access, (2019)Deep pre-trained networks as a feature extractor with XGBoost to detect tuberculosis from chest X-ray., , , , and . Comput. Electr. Eng., (2021)A new recurrent neural network based on direct discretization method for solving discrete time-variant matrix inversion with application., , , , , and . Inf. Sci., (January 2024)Data, information, and knowledge-driven manipulation between strategical planning and technical implementation for wireless sensor network construction., , , , , and . Int. J. Distributed Sens. Networks, (2017)Learning to Detect Memory-related Vulnerabilities., , , , , , , , and . ACM Trans. Softw. Eng. Methodol., 33 (2): 43:1-43:35 (February 2024)