Author of the publication

Poster: Comprehensive Comparisons of Embedding Approaches for Cryptographic API Completion.

, , , , , and . ICSE-Companion, page 360-361. ACM/IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

JIGSAW: Protecting Resource Access by Inferring Programmer Expectations., , , and . USENIX Security Symposium, page 973-988. USENIX Association, (2014)Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer., , , , , and . SPACE, volume 9354 of Lecture Notes in Computer Science, page 55-74. Springer, (2015)Poster: Comprehensive Comparisons of Embedding Approaches for Cryptographic API Completion., , , , , and . ICSE-Companion, page 360-361. ACM/IEEE, (2022)Policy models to protect resource retrieval., , and . SACMAT, page 211-222. ACM, (2014)Pileus: protecting user resources from vulnerable cloud services., , , and . ACSAC, page 52-64. ACM, (2016)GRIFFIN: Guarding Control Flows Using Intel Processor Trace., , and . ASPLOS, page 585-598. ACM, (2017)An SVD-based Collaborative Filtering approach to alleviate cold-start problems., and . FSKD, page 1474-1477. IEEE, (2012)A 0D-3D multi-scale model of the portal venous system coupled with the entire cardiovascular system applied to predict postsplenectomy hemodynamic metrics., , , , , and . EMBC, page 1-4. IEEE, (2023)Core slicing: closing the gap between leaky confidential VMs and bare-metal cloud., , , , , and . OSDI, page 247-267. USENIX Association, (2023)A new prediction approach based on linear regression for collaborative filtering., , , and . FSKD, page 2586-2590. IEEE, (2011)