Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EnnCore: End-to-End Conceptual Guarding of Neural Architectures., , , , , , , , , and 1 other author(s). SafeAI@AAAI, volume 3087 of CEUR Workshop Proceedings, CEUR-WS.org, (2022)EBF 4.2: Black-Box Cooperative Verification for Concurrent Programs - (Competition Contribution)., , , , and . TACAS (2), volume 13994 of Lecture Notes in Computer Science, page 541-546. Springer, (2023)On the efficiency of data collection and aggregation for the combination of multiple classifiers. University of Southampton, UK, (2020)British Library, EThOS.Interval Analysis in Industrial-Scale BMC Software Verifiers: A Case Study., , , , , and . CoRR, (2024)LF-checker: Machine Learning Acceleration of Bounded Model Checking for Concurrency Verification (Competition Contribution)., , , , and . CoRR, (2023)CEG4N: Counter-Example Guided Neural Network Quantization Refinement., , , , and . NSV/FoMLAS@CAV, volume 13466 of Lecture Notes in Computer Science, page 29-45. Springer, (2022)ESBMC v7.4: Harnessing the Power of Intervals - (Competition Contribution)., , , , , , , , , and 2 other author(s). TACAS (3), volume 14572 of Lecture Notes in Computer Science, page 376-380. Springer, (2024)Systematicity, Compositionality and Transitivity of Deep NLP Models: a Metamorphic Testing Perspective., , , , and . ACL (Findings), page 2355-2366. Association for Computational Linguistics, (2022)Designing Learning Algorithms over the Sequence Form of an Extensive-Form Game., , and . AAMAS, page 1622-1624. ACM, (2017)Combining BMC and Fuzzing Techniques for Finding Software Vulnerabilities in Concurrent Programs., , , , , and . IEEE Access, (2022)