From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Demystifying Performance Regressions in String Solvers., , , , , , и . IEEE Trans. Software Eng., 49 (3): 947-961 (марта 2023)An Orchestrated Empirical Study on Deep Learning Frameworks and Platforms., , , , , , , , и . CoRR, (2018)DDoS family: A novel perspective for massive types of DDoS attacks., , , , , , , и . Comput. Secur., (марта 2024)ContrastRepair: Enhancing Conversation-Based Automated Program Repair via Contrastive Test Case Pairs., , , , , и . CoRR, (2024)Learning to Adversarially Blur Visual Object Tracking., , , , , , и . ICCV, стр. 10819-10828. IEEE, (2021)Research and Design of Big Data Relevance Analysis System for Land Development Industry Chain., , , и . ICCCS, стр. 53-58. IEEE, (2021)Decompiling x86 Deep Neural Network Executables., , , , и . USENIX Security Symposium, стр. 7357-7374. USENIX Association, (2023)A3GAN: Attribute-Aware Anonymization Networks for Face De-identification., , , , , и . ACM Multimedia, стр. 5303-5313. ACM, (2022)Locating vulnerabilities in binaries via memory layout recovering., , , , , , , и . ESEC/SIGSOFT FSE, стр. 718-728. ACM, (2019)Loopster: static loop termination analysis., , , , , и . ESEC/SIGSOFT FSE, стр. 84-94. ACM, (2017)