Author of the publication

Proteus: computing disjunctive loop summary via path dependency analysis.

, , , , and . SIGSOFT FSE, page 61-72. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Characterizing usages, updates and risks of third-party libraries in Java projects., , , , , , , and . Empir. Softw. Eng., 27 (4): 90 (2022)MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures., , , , , , , , , and 1 other author(s). USENIX Security Symposium, page 1165-1182. USENIX Association, (2020)Steelix: program-state based binary fuzzing., , , , , and . ESEC/SIGSOFT FSE, page 627-637. ACM, (2017)In Defense of Simple Techniques for Neural Network Test Case Selection., , , , and . ISSTA, page 501-513. ACM, (2023)Localized or architectural: an empirical study of performance issues dichotomy., , , , and . ICSE (Companion Volume), page 316-317. IEEE / ACM, (2019)SPAIN: security patch analysis for binaries towards understanding the pain and pills., , , , and . ICSE, page 462-472. IEEE / ACM, (2017)DangDone: Eliminating Dangling Pointers via Intermediate Pointers., , , , , , , and . Internetware, page 6:1-6:10. ACM, (2018)Patch based vulnerability matching for binary programs., , , , , and . ISSTA, page 376-387. ACM, (2020)Demystifying Dependency Bugs in Deep Learning Stack., , , , , and . ESEC/SIGSOFT FSE, page 450-462. ACM, (2023)Understanding the Complexity and Its Impact on Testing in ML-Enabled Systems., , , , , and . CoRR, (2023)