Author of the publication

Categorizing and Predicting Invalid Vulnerabilities on Common Vulnerabilities and Exposures.

, , , , and . APSEC, page 345-354. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recommending Code Reviewers for Proprietary Software Projects: A Large Scale Study., , , , , and . SANER, page 630-640. IEEE, (2022)What do developers search for on the web?, , , , , and . Empirical Software Engineering, 22 (6): 3149-3185 (2017)Automated unearthing of dangerous issue reports., , , , , , , and . ESEC/SIGSOFT FSE, page 834-846. ACM, (2022)DSM: a specification mining tool using recurrent neural network based language model., , and . ESEC/SIGSOFT FSE, page 896-899. ACM, (2018)Tracking and Analyzing Cross-Cutting Activities in Developers' Daily Work (N)., , , and . ASE, page 277-282. IEEE Computer Society, (2015)Statistical Log Differencing., , , and . ASE, page 851-862. IEEE, (2019)Are Human Rules Necessary? Generating Reusable APIs with CoT Reasoning and In-Context Learning., , , , , and . Proc. ACM Softw. Eng., 1 (FSE): 2355-2377 (2024)Unveil the Mystery of Critical Software Vulnerabilities., , , , , and . SIGSOFT FSE Companion, page 138-149. ACM, (2024)What Permissions Should This Android App Request?, , , and . SATE, page 36-41. IEEE, (2016)APIReal: an API recognition and linking approach for online developer forums., , , and . Empirical Software Engineering, 23 (6): 3129-3160 (2018)