Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Metric Learning via Differential Pairwise Privacy., , , and . CoRR, (2020)Interactive Traceability Links Visualization using Hierarchical Trace Map., , and . ICSME, page 367-369. IEEE, (2019)Enhancing Traceability Link Recovery with Unlabeled Data., , , and . ISSRE, page 446-457. IEEE, (2022)Demystifying the underground ecosystem of account registration bots., , , , , and . ESEC/SIGSOFT FSE, page 897-909. ACM, (2022)New Challenges in Reinforcement Learning: A Survey of Security and Privacy., , , , , and . CoRR, (2023)Typestate-guided fuzzer for discovering use-after-free vulnerabilities., , , , , , , , and . ICSE, page 999-1010. ACM, (2020)Uncovering Limitations in Text-to-Image Generation: A Contrastive Approach with Structured Semantic Alignment., , and . EMNLP (Findings), page 8876-8888. Association for Computational Linguistics, (2023)What Do They Capture? - A Structural Analysis of Pre-Trained Language Models for Source Code., , , , , and . ICSE, page 2377-2388. ACM, (2022)An Empirical Study of Code Deobfuscations on Detecting Obfuscated Android Piggybacked Apps., , , , , and . APSEC, page 41-50. IEEE, (2020)Context-Free Language Reachability via Skewed Tabulation., , , and . Proc. ACM Program. Lang., 8 (PLDI): 1830-1853 (2024)