From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Back-Propagating System Dependency Impact for Attack Investigation., , , , , , , , и . USENIX Security Symposium, стр. 2461-2478. USENIX Association, (2022)Characteristic studies of loop problems for structural test generation via symbolic execution., , , и . ASE, стр. 246-256. IEEE, (2013)DroidMutator: an effective mutation analysis tool for Android applications., , , , и . ICSE (Companion Volume), стр. 77-80. ACM, (2020)Measuring code behavioral similarity for programming and software engineering education., , , , и . ICSE (Companion Volume), стр. 501-510. ACM, (2016)PreInfer: Automatic Inference of Preconditions via Symbolic Analysis., , , и . DSN, стр. 678-689. IEEE Computer Society, (2018)Covana: precise identification of problems in pex., , , и . ICSE, стр. 1004-1006. ACM, (2011)User-aware privacy control via extended static-information-flow analysis., , , , и . ASE, стр. 80-89. ACM, (2012)Are vulnerabilities discovered and resolved like other defects?, , , , и . ICSE, стр. 498. ACM, (2018)HyperService: Interoperability and Programmability Across Heterogeneous Blockchains., , , , , , , и . CCS, стр. 549-566. ACM, (2019)IconIntent: automatic identification of sensitive UI widgets based on icon classification for Android apps., , , , и . ICSE, стр. 257-268. IEEE / ACM, (2019)