Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Empirical Study Towards Characterizing Deep Learning Development and Deployment Across Different Frameworks and Platforms., , , , , , , , and . ASE, page 810-822. IEEE, (2019)Talking Head Generation with Audio and Speech Related Facial Action Units., , , , and . BMVC, page 353. BMVA Press, (2021)Key Aspects Augmentation of Vulnerability Description based on Multiple Security Databases., , , , , and . COMPSAC, page 1020-1025. IEEE, (2021)Predicting Entity Relations across Different Security Databases by Using Graph Attention Network., , , , , and . COMPSAC, page 834-843. IEEE, (2021)ATVHUNTER: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Applications., , , , , , and . ICSE, page 1695-1707. IEEE, (2021)Towards Understanding the Faults of JavaScript-Based Deep Learning Systems., , , , , and . ASE, page 105:1-105:13. ACM, (2022)On the conceptualization of total disturbance and its profound implications., , , , and . Sci. China Inf. Sci., 63 (2): 129201 (2020)Secure Deep Learning Engineering: A Software Quality Assurance Perspective., , , , , , , , , and . CoRR, (2018)ATOM: Commit Message Generation Based on Abstract Syntax Tree and Hybrid Ranking., , , , and . CoRR, (2019)Demystifying Performance Regressions in String Solvers., , , , , , and . IEEE Trans. Software Eng., 49 (3): 947-961 (March 2023)