Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Alleviating Privacy Attacks via Causal Learning., , and . CoRR, (2019)Towards Compliant Data Management Systems for Healthcare ML., , , and . CoRR, (2020)Alleviating Privacy Attacks via Causal Learning., , and . ICML, volume 119 of Proceedings of Machine Learning Research, page 9537-9547. PMLR, (2020)Structurally Heterogeneous Source Code Examples from Unstructured Knowledge Sources., , and . PEPM, page 21-26. ACM, (2015)Proofs from tests., , , and . ISSTA, page 3-14. ACM, (2008)Interpolants as Classifiers., , and . CAV, volume 7358 of Lecture Notes in Computer Science, page 71-87. Springer, (2012)An empirical study of optimizations in YOGI., and . ICSE (1), page 355-364. ACM, (2010)The YogiProject: Software Property Checking via Static Analysis and Testing., , , and . TACAS, volume 5505 of Lecture Notes in Computer Science, page 178-181. Springer, (2009)Unifying Views of Tail-Biting Trellis Constructions for Linear Block Codes., and . IEEE Trans. Inf. Theory, 52 (10): 4431-4443 (2006)Preferential path profiling: compactly numbering interesting paths., , and . POPL, page 351-362. ACM, (2007)