From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Locating vulnerabilities in binaries via memory layout recovering., , , , , , , и . ESEC/SIGSOFT FSE, стр. 718-728. ACM, (2019)Leopard: identifying vulnerable code for vulnerability assessment through program metrics., , , , , , и . ICSE, стр. 60-71. IEEE / ACM, (2019)AutoCom: Automatic Comment Generation for C Code., и . SEKE, стр. 632-633. KSI Research Inc., (2021)PentestGPT: An LLM-empowered Automatic Penetration Testing Tool., , , , , , , , , и . CoRR, (2023)Image-Based Geolocation Using Large Vision-Language Models., , , , , , , , и . CoRR, (2024)Steelix: program-state based binary fuzzing., , , , , и . ESEC/SIGSOFT FSE, стр. 627-637. ACM, (2017)DiffChaser: Detecting Disagreements for Deep Neural Networks., , , , , и . IJCAI, стр. 5772-5778. ijcai.org, (2019)Demystifying RCE Vulnerabilities in LLM-Integrated Apps., , , , и . CoRR, (2023)HalluVault: A Novel Logic Programming-aided Metamorphic Testing Framework for Detecting Fact-Conflicting Hallucinations in Large Language Models., , , , , и . CoRR, (2024)Source Code Summarization in the Era of Large Language Models., , , , , , , , и . CoRR, (2024)