Author of the publication

Counterexample Guided Inductive Synthesis Using Large Language Models and Satisfiability Solving.

, , , , , , and . MILCOM, page 944-949. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stacked Generalizations in Imbalanced Fraud Data Sets using Resampling Methods., and . CoRR, (2020)A maximum expected covering problem for locating and dispatching two classes of military medical evacuation air assets., , and . Optim. Lett., 9 (8): 1511-1531 (2015)A Sensitivity Analysis of Poisoning and Evasion Attacks in Network Intrusion Detection System Machine Learning Models., , and . MILCOM, page 1011-1016. IEEE, (2021)Context-aware Collaborative Neuro-Symbolic Inference in IoBTs., , , , , and . MILCOM, page 1053-1058. IEEE, (2022)Payload-Byte: A Tool for Extracting and Labeling Packet Capture Files of Modern Network Intrusion Detection Datasets., , , , , and . BDCAT, page 58-67. IEEE, (2022)Robust Decision-Making in the Internet of Battlefield Things Using Bayesian Neural Networks., , , and . WSC, page 1-12. IEEE, (2021)Seeing the Whole Elephant - A Comprehensive Framework for Data Education., , , , and . SIGCSE (1), page 248-254. ACM, (2024)Deep VULMAN: A deep reinforcement learning-enabled cyber vulnerability management framework., , and . Expert Syst. Appl., (July 2023)AIS-NIDS: An intelligent and self-sustaining network intrusion detection system., , , and . Comput. Secur., (2024)Predicting F1-Scores of Classifiers in Network Intrusion Detection Systems., , , , , and . ICCCN, page 1-6. IEEE, (2024)