From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Historical Embedding-Guided Efficient Large-Scale Federated Graph Learning., , , , , , , и . Proc. ACM Manag. Data, 2 (3): 144 (2024)Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing., , , , , , , , и . CoRR, (2024)Code2Img: Tree-Based Image Transformation for Scalable Code Clone Detection., , , , , , и . IEEE Trans. Software Eng., 49 (9): 4429-4442 (сентября 2023)Web-based virtual operating of CNC milling machine tools., и . Comput. Ind., 60 (9): 686-697 (2009)Interpreters for GNN-Based Vulnerability Detection: Are We There Yet?, , , , , , и . ISSTA, стр. 1407-1419. ACM, (2023)SCDetector: Software Functional Clone Detection Based on Semantic Tokens Analysis., , , , , , , и . ASE, стр. 821-833. IEEE, (2020)MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis., , , , , и . ASE, стр. 139-150. IEEE, (2019)Gitor: Scalable Code Clone Detection by Building Global Sample Graph., , , , и . ESEC/SIGSOFT FSE, стр. 784-795. ACM, (2023)A Comprehensive Study of Learning-based Android Malware Detectors under Challenging Environments., , , , , и . ICSE, стр. 12:1-12:13. ACM, (2024)Boosting the Capability of Intelligent Vulnerability Detection by Training in a Human-Learning Manner., , , , , и . CoRR, (2021)