Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Can Deepfakes be created on a whim?, , , , , , , and . WWW (Companion Volume), page 1324-1334. ACM, (2023)Benchmarking Large Language Models for Automated Verilog RTL Code Generation., , , , , , , and . DATE, page 1-6. IEEE, (2023)Homo in Machina: Improving Fuzz Testing Coverage via Compartment Analysis., , , , and . ICST, page 117-128. IEEE, (2023)Model Cascading for Code: Reducing Inference Costs with Model Cascading for LLM Based Code Generation., , , , and . CoRR, (2024)Security Implications of Large Language Model Code Assistants: A User Study., , , , , and . CoRR, (2022)Characterizing and Improving Bug-Finders with Synthetic Bugs., , and . SANER, page 971-982. IEEE, (2022)Towards Deceptive Defense in Software Security with Chaff Bugs., , and . RAID, page 43-55. ACM, (2022)BadNets: Evaluating Backdooring Attacks on Deep Neural Networks., , , and . IEEE Access, (2019)Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps., , , , and . SP, page 1106-1120. IEEE, (2020)IRQDebloat: Reducing Driver Attack Surface in Embedded Devices., and . SP, page 1608-1622. IEEE, (2022)