From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Demystifying RCE Vulnerabilities in LLM-Integrated Apps., , , , и . CoRR, (2023)An Empirical Study on Benchmarks of Artificial Software Vulnerabilities., , , , , и . CoRR, (2020)ASTER: Automatic Speech Recognition System Accessibility Testing for Stutterers., , , , , , , , , и . ASE, стр. 510-521. IEEE, (2023)Steelix: program-state based binary fuzzing., , , , , и . ESEC/SIGSOFT FSE, стр. 627-637. ACM, (2017)DiffChaser: Detecting Disagreements for Deep Neural Networks., , , , , и . IJCAI, стр. 5772-5778. ijcai.org, (2019)Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection., , , , , , , , , и . CoRR, (2024)Medusa: Unveil Memory Exhaustion DoS Vulnerabilities in Protocol Implementations., , , , , , , , , и 1 other автор(ы). WWW, стр. 1668-1679. ACM, (2024)PentestGPT: An LLM-empowered Automatic Penetration Testing Tool., , , , , , , , , и . CoRR, (2023)AutoCom: Automatic Comment Generation for C Code., и . SEKE, стр. 632-633. KSI Research Inc., (2021)Leopard: identifying vulnerable code for vulnerability assessment through program metrics., , , , , , и . ICSE, стр. 60-71. IEEE / ACM, (2019)