Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Can Deepfakes be created on a whim?, , , , , , , and . WWW (Companion Volume), page 1324-1334. ACM, (2023)StarCoder: may the source be with you!, , , , , , , , , and 57 other author(s). (2023)cite arxiv:2305.06161.Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants., , , , , and . USENIX Security Symposium, page 2205-2222. USENIX Association, (2023)SoK: Enabling Security Analyses of Embedded Systems via Rehosting., , , , , , , , , and 2 other author(s). AsiaCCS, page 687-701. ACM, (2021)HeapExpo: Pinpointing Promoted Pointers to Prevent Use-After-Free Vulnerabilities., and . ACSAC, page 454-465. ACM, (2020)Examining Zero-Shot Vulnerability Repair with Large Language Models., , , , and . SP, page 2339-2356. IEEE, (2023)Benchmarking Large Language Models for Automated Verilog RTL Code Generation., , , , , , , and . DATE, page 1-6. IEEE, (2023)Homo in Machina: Improving Fuzz Testing Coverage via Compartment Analysis., , , , and . ICST, page 117-128. IEEE, (2023)Security Implications of Large Language Model Code Assistants: A User Study., , , , , and . CoRR, (2022)Model Cascading for Code: Reducing Inference Costs with Model Cascading for LLM Based Code Generation., , , , and . CoRR, (2024)