Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Complexity-guided container replacement synthesis., , , , and . Proc. ACM Program. Lang., 6 (OOPSLA1): 1-31 (2022)Falcon: A Fused Approach to Path-Sensitive Sparse Data Dependence Analysis., , , , , and . Proc. ACM Program. Lang., 8 (PLDI): 567-592 (2024)DCLINK: Bridging Data Constraint Changes and Implementations in FinTech Systems., , , , , , and . ASE, page 914-925. IEEE, (2023)BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning., , , , , and . SP, page 36-50. IEEE, (2022)KBX: Verified Model Synchronization via Formal Bidirectional Transformation., , , , , and . CoRR, (2024)SIRO: Empowering Version Compatibility in Intermediate Representations via Program Synthesis., , , , , and . ASPLOS (3), page 882-899. ACM, (2024)Anchor: Fast and Precise Value-flow Analysis for Containers via Memory Orientation., , , , , , and . ACM Trans. Softw. Eng. Methodol., 32 (3): 66:1-66:39 (May 2023)Fuzzing SMT solvers via two-dimensional input space exploration., , , , , and . ISSTA, page 322-335. ACM, (2021)Demystifying Template-Based Invariant Generation for Bit-Vector Programs., , , , , and . ASE, page 673-685. IEEE, (2023)Place Your Locks Well: Understanding and Detecting Lock Misuse Bugs., , , and . USENIX Security Symposium, page 3727-3744. USENIX Association, (2023)