Author of the publication

Key Aspects Augmentation of Vulnerability Description based on Multiple Security Databases.

, , , , , and . COMPSAC, page 1020-1025. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ATOM: Commit Message Generation Based on Abstract Syntax Tree and Hybrid Ranking., , , , and . CoRR, (2019)Key Aspects Augmentation of Vulnerability Description based on Multiple Security Databases., , , , , and . COMPSAC, page 1020-1025. IEEE, (2021)Predicting Entity Relations across Different Security Databases by Using Graph Attention Network., , , , , and . COMPSAC, page 834-843. IEEE, (2021)Towards Understanding the Faults of JavaScript-Based Deep Learning Systems., , , , , and . ASE, page 105:1-105:13. ACM, (2022)ATVHUNTER: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Applications., , , , , , and . ICSE, page 1695-1707. IEEE, (2021)Demystifying Performance Regressions in String Solvers., , , , , , and . IEEE Trans. Software Eng., 49 (3): 947-961 (March 2023)Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers., , , , and . CoRR, (2020)On the conceptualization of total disturbance and its profound implications., , , , and . Sci. China Inf. Sci., 63 (2): 129201 (2020)Maintenance decision methodology of petrochemical plant based on fuzzy curvelet neural network., , , and . Appl. Soft Comput., (2018)Talking Head Generation with Audio and Speech Related Facial Action Units., , , , and . BMVC, page 353. BMVA Press, (2021)