Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Memory Leak Detection in IoT Program Based on an Abstract Memory Model SeqMM., , , , and . IEEE Access, (2019)Combination of Evidential Sensor Reports with Distance Function and Belief Entropy in Fault Diagnosis., , , , and . Int. J. Comput. Commun. Control, 14 (3): 329-343 (2019)Automated Program-Semantic Defect Repair and False-Positive Elimination without Side Effects., , , , , , and . Symmetry, 12 (12): 2076 (2020)Mesh2Measure: A Novel Body Dimensions Measurement Based on 3D Human Model., , , , , and . INTETAIN, volume 429 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 80-99. Springer, (2021)An Approach for Identifying Detecting Objects of Null Dereference.. J. Softw., 9 (11): 2771-2777 (2014)Automatic Repair Method for Null Pointer Dereferences Guided by Program Dependency Graph., , and . Symmetry, 14 (8): 1555 (2022)An Efficient Style Virtual Try on Network., , and . CoRR, (2021)SedSVD: Statement-level software vulnerability detection based on Relational Graph Convolutional Network with subgraph embedding., , , , and . Inf. Softw. Technol., (June 2023)Symbolic Procedure Summary Using Region-based Symbolic Three-valued Logic., , and . J. Comput., 9 (3): 774-780 (2014)An iterative 3D human body reconstruction method driven by personalized dimensional prior knowledge., , , , and . Appl. Intell., 54 (1): 738-748 (January 2024)