Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep learning for picking point detection in dense cluster., , , , , , , , , and . ASCC, page 1644-1649. IEEE, (2017)ReDefender: A Tool for Detecting Reentrancy Vulnerabilities in Smart Contracts Effectively., , , and . QRS, page 915-925. IEEE, (2021)Ising-Traffic: Using Ising Machine Learning to Predict Traffic Congestion under Uncertainty., , , , , , , and . AAAI, page 9354-9363. AAAI Press, (2023)Chain-of-Action: Faithful and Multimodal Question Answering through Large Language Models., , , and . CoRR, (2024)Codev-Bench: How Do LLMs Understand Developer-Centric Code Completion?, , , , , , , and . CoRR, (2024)Software-Hardware Co-design of Heterogeneous SmartNIC System for Recommendation Models Inference and Training., , , , , , , , , and . ICS, page 336-347. ACM, (2023)HeteGraph-Mamba: Heterogeneous Graph Learning via Selective State Space Model., , , and . CoRR, (2024)SolDetector: Detect Defects Based on Knowledge Graph of Solidity Smart Contract., , and . SEKE, page 423-428. KSI Research Inc., (2021)Intuitive Searching: An Approach to Search the Decision Policy of a Blackjack Agent., , and . ICICT (2), volume 236 of Lecture Notes in Networks and Systems, page 869-887. Springer, (2021)EvoFuzzer: An Evolutionary Fuzzer for Detecting Reentrancy Vulnerability in Smart Contracts., , and . IEEE Trans. Netw. Sci. Eng., 11 (6): 5790-5802 (November 2024)