Author of the publication

Proteus: computing disjunctive loop summary via path dependency analysis.

, , , , and . SIGSOFT FSE, page 61-72. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Orchestrated Empirical Study on Deep Learning Frameworks and Platforms., , , , , , , , and . CoRR, (2018)Demystifying Performance Regressions in String Solvers., , , , , , and . IEEE Trans. Software Eng., 49 (3): 947-961 (March 2023)Learning to Adversarially Blur Visual Object Tracking., , , , , , and . ICCV, page 10819-10828. IEEE, (2021)ContrastRepair: Enhancing Conversation-Based Automated Program Repair via Contrastive Test Case Pairs., , , , , and . CoRR, (2024)DDoS family: A novel perspective for massive types of DDoS attacks., , , , , , , and . Comput. Secur., (March 2024)Research and Design of Big Data Relevance Analysis System for Land Development Industry Chain., , , and . ICCCS, page 53-58. IEEE, (2021)Decompiling x86 Deep Neural Network Executables., , , , and . USENIX Security Symposium, page 7357-7374. USENIX Association, (2023)An empirical study of GUI widget detection for industrial mobile games., , , , , , , and . ESEC/SIGSOFT FSE, page 1427-1437. ACM, (2021)Proteus: computing disjunctive loop summary via path dependency analysis., , , , and . SIGSOFT FSE, page 61-72. ACM, (2016)Locating vulnerabilities in binaries via memory layout recovering., , , , , , , and . ESEC/SIGSOFT FSE, page 718-728. ACM, (2019)