Author of the publication

A large-scale empirical study on vulnerability distribution within projects and the lessons learned.

, , , , , , , , and . ICSE, page 1547-1559. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on Vehicle Taillight Detection and Semantic Recognition Based on Internet of Vehicle., , , , and . CyberC, IEEE, (2018)Can We Make It Faster? Efficient May-Happen-in-Parallel Analysis Revisited., , , , and . PDCAT, page 59-64. IEEE, (2012)Tracking Control of Wheeled Mobile Robots with Unknown Dynamics., and . ICRA, page 2645-2650. IEEE Robotics and Automation Society, (1999)RIBDetector: an RFC-guided Inconsistency Bug Detecting Approach for Protocol Implementations., , , , and . SANER, page 641-651. IEEE, (2022)Adaptive fault-tolerant control for cooperative spacecraft rendezvous and docking., and . ACC, page 3747-3752. IEEE, (2017)Stabilizing a VTOL Aircraft Based on Controlled Lagrangian Method., and . CDC, page 5874-5879. IEEE, (2019)Decompilation Based Deep Binary-Source Function Matching., , , , , , and . SciSec, volume 14299 of Lecture Notes in Computer Science, page 244-260. Springer, (2023)MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures., , , , , , , , , and 1 other author(s). USENIX Security Symposium, page 1165-1182. USENIX Association, (2020)A large-scale empirical study on vulnerability distribution within projects and the lessons learned., , , , , , , , and . ICSE, page 1547-1559. ACM, (2020)Open-Source License Violations of Binary Software at Large Scale., , , , , , , , , and 2 other author(s). SANER, page 564-568. IEEE, (2019)