Author of the publication

ALPHAPROG: Reinforcement Generation of Valid Programs for Compiler Fuzzing.

, , , , and . AAAI, page 12559-12565. AAAI Press, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adversarially Reprogramming Pretrained Neural Networks for Data-limited and Cost-efficient Malware Detection., , and . SDM, page 693-701. SIAM, (2022)Adversary for Social Good: Leveraging Adversarial Attacks to Protect Personal Attribute Privacy., , and . ACM Trans. Knowl. Discov. Data, 18 (2): 46:1-46:24 (February 2024)iTrustSO: an intelligent system for automatic detection of insecure code snippets in stack overflow., , , , , and . ASONAM, page 1097-1104. ACM, (2019)Watermarking-based Defense against Adversarial Attacks on Deep Neural Networks., , , , and . IJCNN, page 1-8. IEEE, (2021)Automatic Detection of Helmet Uses for Construction Safety., , , , , , and . WI Workshops, page 135-142. IEEE Computer Society, (2016)Code Execution Capability as a Metric for Machine Learning-Assisted Software Vulnerability Detection Models., , and . TrustCom, page 1606-1613. IEEE, (2023)AiDroid: When Heterogeneous Information Network Marries Deep Neural Network for Real-time Android Malware Detection., , , , , , , and . CoRR, (2018)Distilling Knowledge on Text Graph for Social Media Attribute Inference., , , and . SIGIR, page 2024-2028. ACM, (2022)SecMD: Make Machine Learning More Secure Against Adversarial Malware Attacks., and . Australasian Conference on Artificial Intelligence, volume 10400 of Lecture Notes in Computer Science, page 76-89. Springer, (2017)Plagiarism Detection of Multi-threaded Programs using Frequent Behavioral Pattern Mining., , , and . SEKE, page 293-298. KSI Research Inc., (2020)