Author of the publication

Poster: Comprehensive Comparisons of Embedding Approaches for Cryptographic API Completion.

, , , , , and . ICSE-Companion, page 360-361. ACM/IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Poster: Deployment-quality and Accessible Solutions for Cryptography Code Development., , , , , , , , , and . CCS, page 2545-2547. ACM, (2019)LASE: locating and applying systematic edits by learning from examples., , and . ICSE, page 502-511. IEEE Computer Society, (2013)How reliable is the crowdsourced knowledge of security implementation?, , , , and . ICSE, page 536-547. IEEE / ACM, (2019)How Do Developers Follow Security-Relevant Best Practices When Using NPM Packages?, , , and . SecDev, page 77-83. IEEE, (2022)Detecting Build Conflicts in Software Merge for Java Programs via Static Analysis., , , and . ASE, page 33:1-33:13. ACM, (2022)Quantitative Analysis of Tourism Resources in Three Gorges Based on Multi-level Fuzzy Evaluation Method., and . CSIA (2), volume 1147 of Advances in Intelligent Systems and Computing, page 367-373. Springer, (2020)Virtual cell-based mobility enhancement and performance evaluation in ultra-dense networks., , and . WCNC, page 1-6. IEEE, (2016)Sydit: creating and applying a program transformation from an example., , and . SIGSOFT FSE, page 440-443. ACM, (2011)An Empirical Study of Multi-entity Changes in Real Bug Fixes., , and . ICSME, page 287-298. IEEE Computer Society, (2018)VRGuide: Efficient Testing of Virtual Reality Scenes via Dynamic Cut Coverage., , and . ASE, page 951-962. IEEE, (2023)