Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scaling up Superoptimization., , , and . ASPLOS, page 297-310. ACM, (2016)GreenThumb: superoptimizer construction framework., , , and . CC, page 261-262. ACM, (2016)Statistical Security Incident Forensics against Data Falsification in Smart Grid Advanced Metering Infrastructure., , , and . CODASPY, page 35-45. ACM, (2017)AntiCopyPaster: Extracting Code Duplicates As Soon As They Are Introduced in the IDE., , , , , , , , , and . ASE, page 152:1-152:4. ACM, (2022)Towards Fast and Semi-supervised Identification of Smart Meters Launching Data Falsification Attacks., , and . AsiaCCS, page 173-185. ACM, (2018)Just-in-Time Code Duplicates Extraction., , , , , , , , , and . CoRR, (2023)A Method for Symbolic Computation of Abstract Operations., and . CAV, volume 7358 of Lecture Notes in Computer Science, page 174-192. Springer, (2012)Provable repair of deep neural networks., and . PLDI, page 588-603. ACM, (2021)Path-based function embedding and its application to error-handling specification mining., , and . ESEC/SIGSOFT FSE, page 423-433. ACM, (2018)Path-based function embeddings., , and . ICSE (Companion Volume), page 430-431. ACM, (2018)