Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How Do Developers Follow Security-Relevant Best Practices When Using NPM Packages?, , , and . SecDev, page 77-83. IEEE, (2022)Detecting Build Conflicts in Software Merge for Java Programs via Static Analysis., , , and . ASE, page 33:1-33:13. ACM, (2022)How reliable is the crowdsourced knowledge of security implementation?, , , , and . ICSE, page 536-547. IEEE / ACM, (2019)Quantitative Analysis of Tourism Resources in Three Gorges Based on Multi-level Fuzzy Evaluation Method., and . CSIA (2), volume 1147 of Advances in Intelligent Systems and Computing, page 367-373. Springer, (2020)LASE: locating and applying systematic edits by learning from examples., , and . ICSE, page 502-511. IEEE Computer Society, (2013)Poster: Deployment-quality and Accessible Solutions for Cryptography Code Development., , , , , , , , , and . CCS, page 2545-2547. ACM, (2019)An Empirical Study of Multi-entity Changes in Real Bug Fixes., , and . ICSME, page 287-298. IEEE Computer Society, (2018)Virtual cell-based mobility enhancement and performance evaluation in ultra-dense networks., , and . WCNC, page 1-6. IEEE, (2016)Sydit: creating and applying a program transformation from an example., , and . SIGSOFT FSE, page 440-443. ACM, (2011)VRGuide: Efficient Testing of Virtual Reality Scenes via Dynamic Cut Coverage., , and . ASE, page 951-962. IEEE, (2023)