Author of the publication

In Defense of Simple Techniques for Neural Network Test Case Selection.

, , , , and . ISSTA, page 501-513. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Characterizing usages, updates and risks of third-party libraries in Java projects., , , , , , , and . Empir. Softw. Eng., 27 (4): 90 (2022)Steelix: program-state based binary fuzzing., , , , , and . ESEC/SIGSOFT FSE, page 627-637. ACM, (2017)SPAIN: security patch analysis for binaries towards understanding the pain and pills., , , , and . ICSE, page 462-472. IEEE / ACM, (2017)DangDone: Eliminating Dangling Pointers via Intermediate Pointers., , , , , , , and . Internetware, page 6:1-6:10. ACM, (2018)MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures., , , , , , , , , and 1 other author(s). USENIX Security Symposium, page 1165-1182. USENIX Association, (2020)In Defense of Simple Techniques for Neural Network Test Case Selection., , , , and . ISSTA, page 501-513. ACM, (2023)Localized or architectural: an empirical study of performance issues dichotomy., , , , and . ICSE (Companion Volume), page 316-317. IEEE / ACM, (2019)Patch based vulnerability matching for binary programs., , , , , and . ISSTA, page 376-387. ACM, (2020)Demystifying Dependency Bugs in Deep Learning Stack., , , , , and . ESEC/SIGSOFT FSE, page 450-462. ACM, (2023)Interactive, effort-aware library version harmonization., , , , , and . ESEC/SIGSOFT FSE, page 518-529. ACM, (2020)