From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fine-grained Commit-level Vulnerability Type Prediction by CWE Tree Structure., , , , и . ICSE, стр. 957-969. IEEE, (2023)Automating Developer Chat Mining., , , , , и . ASE, стр. 854-866. IEEE, (2021)Rolled Fingerprint Mosaicking Algorithm Based on Block Scale., , , , и . CCBR, том 11818 из Lecture Notes in Computer Science, стр. 55-62. Springer, (2019)Automated unearthing of dangerous issue reports., , , , , , , и . ESEC/SIGSOFT FSE, стр. 834-846. ACM, (2022)Unveil the Mystery of Critical Software Vulnerabilities., , , , , и . SIGSOFT FSE Companion, стр. 138-149. ACM, (2024)Cybersecurity risk testing of substation phasor measurement units and phasor data concentrators., , , , , , , и . CSIIRW, стр. 24. ACM, (2011)Towards More Practical Automation of Vulnerability Assessment., , , , , и . ICSE, стр. 148:1-148:13. ACM, (2024)Automating Zero-Shot Patch Porting for Hard Forks., , , , , и . ISSTA, стр. 363-375. ACM, (2024)Causal event graphs cyber-physical system intrusion detection system., , , и . CSIIRW, стр. 40. ACM, (2013)Protocol mutation intrusion detection for synchrophasor communications., , , , и . CSIIRW, стр. 41. ACM, (2013)