Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

UI X-Ray: Interactive Mobile UI Testing Based on Computer Vision., , , , , and . IUI, page 245-255. ACM, (2017)More Is Less: Learning Efficient Video Representations by Big-Little Network and Depthwise Temporal Aggregation., , , , and . NeurIPS, page 2261-2270. (2019)Dynamic detection of inter-application communication vulnerabilities in Android., , and . ISSTA, page 118-128. ACM, (2015)Parallelization of Classical Numerical optimization in Quantum Variational Algorithms., , , , and . ICST, page 309-320. IEEE, (2020)End-to-End Protocol for High-Quality QAOA Parameters with Few Shots., , , , and . CoRR, (2024)Andromeda: Accurate and Scalable Security Analysis of Web Applications., , , , and . FASE, volume 7793 of Lecture Notes in Computer Science, page 210-225. Springer, (2013)Access-rights Analysis in the Presence of Subjects., , and . ECOOP, volume 37 of LIPIcs, page 222-246. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2015)Blind quantum machine learning with quantum bipartite correlator., , , , , , , , , and 4 other author(s). CoRR, (2023)Role-Based access control consistency validation., , , and . ISSTA, page 121-132. ACM, (2006)Multiangle QAOA Does Not Always Need All Its Angles., , , , , and . SEC, page 414-419. IEEE, (2022)