Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Audience structure and status multiplicity., and . Soc. Networks, (2016)Adaptive Contrast Enhancement for Infrared Images Based on the Neighborhood Conditional Histogram., , , , , and . Remote. Sens., 11 (11): 1381 (2019)Cargo Ecosystem Dependency-Vulnerability Knowledge Graph Construction and Vulnerability Propagation Study., , , , , , and . CoRR, (2022)Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines., , , , , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (1): 403-418 (January 2024)Data driven security analysis of open source software. Nanyang Technological University, Singapore, (2023)Has My Release Disobeyed Semantic Versioning? Static Detection Based on Semantic Differencing., , , , , , and . ASE, page 51:1-51:12. ACM, (2022)HS2N: Heterogeneous Semantics-Syntax Fusion Network for Document-Level Event Factuality Identification., , , , and . PRICAI (2), volume 13630 of Lecture Notes in Computer Science, page 309-320. Springer, (2022)Software Composition Analysis for Vulnerability Detection: An Empirical Study on Java Projects., , , , , , , and . ESEC/SIGSOFT FSE, page 960-972. ACM, (2023)Software Architecture Recovery with Information Fusion., , , , , , and . ESEC/SIGSOFT FSE, page 1535-1547. ACM, (2023)An Approach to Generate the Traceability Between Restricted Natural Language Requirements and AADL Models., , , , , , and . IEEE Trans. Reliability, 69 (1): 154-173 (2020)