Author of the publication

Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search.

, , , , , , and . ICSE, page 462-473. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search., , , , , , and . CoRR, (2021)FCD-Net: Learning to Detect Multiple Types of Homologous Deepfake Face Images., , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)Modeling Dual Period-Varying Preferences for Takeaway Recommendation., , , , , , , , , and . KDD, page 5628-5638. ACM, (2023)Asymptotics of the weighted least squares estimation for AR(1) processes with applications to confidence intervals., , and . Stat. Methods Appl., 27 (3): 479-490 (2018)Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search., , , , , , and . ICSE, page 462-473. ACM, (2022)RPAU: Fooling the Eyes of UAVs via Physical Adversarial Patches., , , , and . IEEE Trans. Intell. Transp. Syst., 25 (3): 2586-2598 (March 2024)An improved recovery method of rail crack signal based on least-square deconvolution algorithm with sectional regulatory factors., , , , and . I2MTC, page 1-6. IEEE, (2018)IMShell-Dec: Pay More Attention to External Links in PowerShell., , , , , and . SEC, volume 580 of IFIP Advances in Information and Communication Technology, page 189-202. Springer, (2020)A secured TPM integration scheme towards smart embedded system based collaboration network., , , , , , , and . Comput. Secur., (2020)A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects., , , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)