From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Test mimicry to assess the exploitability of library vulnerabilities., , , , и . ISSTA, стр. 276-288. ACM, (2022)Symbolic Pathfinder for SV-COMP - (Competition Contribution)., , , , и . TACAS (3), том 11429 из Lecture Notes in Computer Science, стр. 239-243. Springer, (2019)ReFixar: Multi-version Reasoning for Automated Repair of Regression Errors., и . ISSRE, стр. 162-172. IEEE, (2021)JFIX: semantics-based repair of Java programs via symbolic PathFinder., , , , и . ISSTA, стр. 376-379. ACM, (2017)Toward the Analysis of Graph Neural Networks., , , , и . ICSE (NIER), стр. 116-120. IEEE/ACM, (2022)An Efficient Cyclic Entailment Procedure in a Fragment of Separation Logic., и . FoSSaCS, том 13992 из Lecture Notes in Computer Science, стр. 477-497. Springer, (2023)AutoPruner: transformer-based call graph pruning., , , , , , и . ESEC/SIGSOFT FSE, стр. 520-532. ACM, (2022)Adversarial Patch Generation for Automatic Program Repair., , , и . CoRR, (2020)VulCurator: a vulnerability-fixing commit detector., , , , и . ESEC/SIGSOFT FSE, стр. 1726-1730. ACM, (2022)Towards efficient and effective automatic program repair.. ASE, стр. 876-879. ACM, (2016)