Author of the publication

D2A: A Dataset Built for AI-Based Vulnerability Detection Methods Using Differential Analysis.

, , , , , , , , and . ICSE (SEIP), page 111-120. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Kind of Attitude Algorithm for High Dynamic IMU., and . AsiaSim/SCS AutumnSim (1), volume 643 of Communications in Computer and Information Science, page 47-56. (2016)Relevance feedback using a Bayesian classifier in content-based image retrieval., , and . Storage and Retrieval for Media Databases, volume 4315 of SPIE Proceedings, page 97-106. SPIE, (2001)RStar: an RDF storage and query system for enterprise resource management., , , , and . CIKM, page 484-491. ACM, (2004)Social context summarization., , , , , and . SIGIR, page 255-264. ACM, (2011)Boosting social annotations using propagation., , , , , and . CIKM, page 1507-1508. ACM, (2008)Research on Channel Characteristics and Electrode Electrical Performance of Earth Current Field Information Transmission Technology., , , , , and . Sensors, 23 (13): 5936 (July 2023)D2A: A Dataset Built for AI-Based Vulnerability Detection Methods Using Differential Analysis., , , , , , , , and . ICSE (SEIP), page 111-120. IEEE, (2021)Floatcascade learning for fast imbalanced web mining., , , , , and . WWW, page 71-80. ACM, (2008)Hidden sentiment association in chinese web opinion mining., , , , , , , and . WWW, page 959-968. ACM, (2008)ArnetMiner: extraction and mining of academic social networks., , , , , and . KDD, page 990-998. ACM, (2008)