Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generate Your Counterfactuals: Towards Controlled Counterfactual Generation for Text., , , and . CoRR, (2020)An Ontology based Dialog Interface to Database., , , and . SIGMOD Conference, page 1749-1752. ACM, (2018)Bootstrapping Chatbot Interfaces to Databases., , , , , and . COMAD/CODS, page 47-55. ACM, (2021)Fault localization for data-centric programs., , , , , and . SIGSOFT FSE, page 157-167. ACM, (2011)Incremental and demand-driven points-to analysis using logic programming., and . PPDP, page 117-128. ACM, (2005)Detecting and Mitigating Secret-Key Leaks in Source Code Repositories., , , , and . MSR, page 396-400. IEEE Computer Society, (2015)Extending logical attack graphs for efficient vulnerability analysis.. ACM Conference on Computer and Communications Security, page 63-74. ACM, (2008)Software testing in the machine learning era., , , , , , and . Empir. Softw. Eng., 28 (3): 74 (June 2023)Interpretable differencing of machine learning models., , , , and . UAI, volume 216 of Proceedings of Machine Learning Research, page 788-797. PMLR, (2023)Natural language querying in SAP-ERP platform., , , and . ESEC/SIGSOFT FSE, page 878-883. ACM, (2017)