Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Feature Space Adversarial Attack., , , , and . CoRR, (2020)Leveraging Documentation to Test Deep Learning Library Functions., , , , , , and . CoRR, (2021)Detecting sensitive data disclosure via bi-directional text correlation analysis., , and . SIGSOFT FSE, page 169-180. ACM, (2016)Analyzing the robustness of FTSP with timed automata., , , and . Internetware, page 21. ACM, (2010)DisGUIDE: Disagreement-Guided Data-Free Model Extraction., , , and . AAAI, page 9614-9622. AAAI Press, (2023)DASE: Document-Assisted Symbolic Execution for Improving Automated Software Testing., , , , and . ICSE (1), page 620-631. IEEE Computer Society, (2015)CloCom: Mining existing source code for automatic comment generation., , and . SANER, page 380-389. IEEE Computer Society, (2015)iKernel: Isolating Buggy and Malicious Device Drivers Using Hardware Virtualization Support., , , , , , and . DASC, page 134-144. IEEE Computer Society, (2007)Gatekeepers to broadening participation in engineering investigating variation across high schools comparing who could go versus who does go into engineering., , , , , , , and . FIE, page 1-5. IEEE Computer Society, (2017)Internet of Things for Special Materials Transportation Vehicles., , , and . GreenCom/iThings/CPScom, page 1891-1894. IEEE, (2013)