Author of the publication

Optimizing selection of competing features via feedback-directed evolutionary algorithms.

, , , , , and . ISSTA, page 246-256. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mystique: Evolving Android Malware for Auditing Anti-Malware Tools., , , , , , and . AsiaCCS, page 365-376. ACM, (2016)Prediction of Vulnerability Characteristics Based on Vulnerability Description and Prompt Learning., , , , and . SANER, page 604-615. IEEE, (2023)From Collision to Verdict: Responsibility Attribution for Autonomous Driving Systems Testing., , , , and . ISSRE, page 321-332. IEEE, (2023)CloneDifferentiator: Analyzing clones by differentiation., , and . ASE, page 576-579. IEEE Computer Society, (2011)Avoiding Some Common Preprocessing Pitfalls with Feature Queries., , , and . APSEC, page 283-290. IEEE Computer Society, (2009)Rust-lancet: Automated Ownership-Rule-Violation Fixing with Behavior Preservation., , and . ICSE, page 85:1-85:13. ACM, (2024)Mashup Technology: Beyond Open Programming Interfaces., , and . Computer, 46 (12): 96-99 (2013)Cerebro: context-aware adaptive fuzzing for effective vulnerability detection., , , , , , , and . ESEC/SIGSOFT FSE, page 533-544. ACM, (2019)Mining implicit design templates for actionable code reuse., , , , , , , , and . ASE, page 394-404. IEEE Computer Society, (2017)Understanding Feature Evolution in a Family of Product Variants., , and . WCRE, page 109-118. IEEE Computer Society, (2010)