Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TCOZ Approach to OWL-S Process Model Design., , , and . SEKE, page 354-359. (2005)Evolution and Runtime Monitoring of Software Systems., , and . SEKE, page 343-348. Knowledge Systems Institute Graduate School, (2007)BOWL: augmenting the Semantic Web with beliefs., , , , , and . Innov. Syst. Softw. Eng., 11 (3): 203-215 (2015)Empirical Study on Transformer-based Techniques for Software Engineering., , , , , and . CoRR, (2023)A Systematic Study on Explicit-State Non-Zenoness Checking for Timed Automata., , , , , , , and . IEEE Trans. Software Eng., 41 (1): 3-18 (2015)RegMiner: mining replicable regression dataset from code repositories., , , , , , , and . ESEC/SIGSOFT FSE, page 1711-1715. ACM, (2022)RegMiner: towards constructing a large regression dataset from code evolution history., , , , , , and . ISSTA, page 314-326. ACM, (2022)Inferring Phishing Intention via Webpage Appearance and Dynamics: A Deep Vision Based Approach., , , , , and . USENIX Security Symposium, page 1633-1650. USENIX Association, (2022)A First Look at the Effect of Deep Learning in Coverage-guided Fuzzing., , , , , , , and . ASE, page 1186-1189. IEEE, (2021)Enhancing Federated Learning Robustness Using Data-Agnostic Model Pruning., , , , and . PAKDD (2), volume 13936 of Lecture Notes in Computer Science, page 441-453. Springer, (2023)