Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bayesian Cramér-rao Bound for channel estimation in cooperative OFDM., , , and . WCSP, page 1-6. IEEE, (2010)SPVF: security property assisted vulnerability fixing via attention-based models., , , , , , , and . Empir. Softw. Eng., 27 (7): 171 (2022)Leaks or Not: A Framework for Evaluating Cache Timing Side Channel Attacks in SGX., , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1467-1470. IEEE, (2018)Dynamic Analysis of a New Financial System with Diffusion Effect and Two Delays., , and . Int. J. Bifurc. Chaos, 32 (16): 2250236:1-2250236:22 (December 2022)Data Quality Matters: A Case Study on Data Label Correctness for Security Bug Report Prediction., , , and . IEEE Trans. Software Eng., 48 (7): 2541-2556 (2022)Automatic software vulnerability assessment by extracting vulnerability elements., , , , , , and . J. Syst. Softw., (October 2023)Towards understanding bugs in an open source cloud management stack: An empirical study of OpenStack software bugs., , , , and . J. Syst. Softw., (2019)Improving high-impact bug report prediction with combination of interactive machine learning and active learning., , , , , and . Inf. Softw. Technol., (2021)Coca: Improving and Explaining Graph Neural Network-Based Vulnerability Detection Systems., , , , , , and . CoRR, (2024)RNNtcs: A test case selection method for Recurrent Neural Networks., , , , , and . Knowl. Based Syst., (November 2023)