From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SYNODE: Understanding and Automatically Preventing Injection Attacks on NODE.JS., , и . NDSS, The Internet Society, (2018)Mir: Automated Quantifiable Privilege Reduction Against Dynamic Library Compromise in JavaScript., , , , , , и . CoRR, (2020)SimSCOOD: Systematic Analysis of Out-of-Distribution Generalization in Fine-tuned Source Code Models., , , и . NAACL-HLT (Findings), стр. 1400-1416. Association for Computational Linguistics, (2024)Saying 'hi!' is not enough: mining inputs for effective test generation., , и . ASE, стр. 44-49. IEEE Computer Society, (2017)Leaky Images: Targeted Privacy Attacks in the Web., и . USENIX Security Symposium, стр. 923-939. USENIX Association, (2019)User Profiles: The Achilles' Heel of Web Browsers., , , и . CoRR, (апреля 2025)Small World with High Risks: A Study of Security Threats in the npm Ecosystem., , , и . USENIX Security Symposium, стр. 995-1010. USENIX Association, (2019)SimSCOOD: Systematic Analysis of Out-of-Distribution Behavior of Source Code Models., , , и . CoRR, (2022)SecBench.js: An Executable Security Benchmark Suite for Server-Side JavaScript., , , , и . ICSE, стр. 1059-1070. IEEE, (2023)Typed and Confused: Studying the Unexpected Dangers of Gradual Typing., , и . ASE, стр. 1858-1870. ACM, (2024)