Author of the publication

Demystifying Performance Regressions in String Solvers.

, , , , , , and . IEEE Trans. Software Eng., 49 (3): 947-961 (March 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Deep Learning Engineering: A Software Quality Assurance Perspective., , , , , , , , , and . CoRR, (2018)ATOM: Commit Message Generation Based on Abstract Syntax Tree and Hybrid Ranking., , , , and . CoRR, (2019)Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers., , , , and . CoRR, (2020)SEC4SR: A Security Analysis Platform for Speaker Recognition., , , , , and . CoRR, (2021)Maintenance decision methodology of petrochemical plant based on fuzzy curvelet neural network., , , and . Appl. Soft Comput., (2018)On the conceptualization of total disturbance and its profound implications., , , , and . Sci. China Inf. Sci., 63 (2): 129201 (2020)Demystifying Performance Regressions in String Solvers., , , , , , and . IEEE Trans. Software Eng., 49 (3): 947-961 (March 2023)Key Aspects Augmentation of Vulnerability Description based on Multiple Security Databases., , , , , and . COMPSAC, page 1020-1025. IEEE, (2021)Predicting Entity Relations across Different Security Databases by Using Graph Attention Network., , , , , and . COMPSAC, page 834-843. IEEE, (2021)ATVHUNTER: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Applications., , , , , , and . ICSE, page 1695-1707. IEEE, (2021)