From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Reusing Deep Learning Models: Challenges and Directions in Software Engineering., , , , , и . CoRR, (2024)PTMTorrent: A Dataset for Mining Open-source Pre-trained Model Packages., , , , , , , и . MSR, стр. 57-61. IEEE, (2023)An Empirical Study of Pre-Trained Model Reuse in the Hugging Face Deep Learning Model Registry., , , , , , , и . ICSE, стр. 2463-2475. IEEE, (2023)SoK: Analysis of Software Supply Chain Security by Establishing Secure Design Properties., , , и . SCORED@CCS, стр. 15-24. ACM, (2022)Reflecting on the Use of the Policy-Process-Product Theory in Empirical Software Engineering., , , , , и . ESEC/SIGSOFT FSE, стр. 2112-2116. ACM, (2023)An Empirical Study on Using Large Language Models to Analyze Software Supply Chain Security Failures., , , , и . SCORED@CCS, стр. 5-15. ACM, (2023)An Empirical Study of Artifacts and Security Risks in the Pre-trained Model Supply Chain., , , , , , , и . SCORED@CCS, стр. 105-114. ACM, (2022)SoK: Analysis of Software Supply Chain Security by Establishing Secure Design Properties., , , и . CoRR, (2024)Reusing Deep Learning Models: Challenges and Directions in Software Engineering., , , , , и . JVA, стр. 17-30. IEEE, (2023)