Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AutoPruner: transformer-based call graph pruning., , , , , , and . ESEC/SIGSOFT FSE, page 520-532. ACM, (2022)An Efficient Cyclic Entailment Procedure in a Fragment of Separation Logic., and . FoSSaCS, volume 13992 of Lecture Notes in Computer Science, page 477-497. Springer, (2023)Toward the Analysis of Graph Neural Networks., , , , and . ICSE (NIER), page 116-120. IEEE/ACM, (2022)Symbolic Pathfinder for SV-COMP - (Competition Contribution)., , , , and . TACAS (3), volume 11429 of Lecture Notes in Computer Science, page 239-243. Springer, (2019)Test mimicry to assess the exploitability of library vulnerabilities., , , , and . ISSTA, page 276-288. ACM, (2022)ReFixar: Multi-version Reasoning for Automated Repair of Regression Errors., and . ISSRE, page 162-172. IEEE, (2021)JFIX: semantics-based repair of Java programs via symbolic PathFinder., , , , and . ISSTA, page 376-379. ACM, (2017)Adversarial Patch Generation for Automatic Program Repair., , , and . CoRR, (2020)Exploring True Test Overfitting in Dynamic Automated Program Repair using Formal Methods., , , , and . ICST, page 229-240. IEEE, (2021)VulCurator: a vulnerability-fixing commit detector., , , , and . ESEC/SIGSOFT FSE, page 1726-1730. ACM, (2022)