Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzz testing in practice: Obstacles and solutions., , , , and . SANER, page 562-566. IEEE Computer Society, (2018)RIFF: Reduced Instruction Footprint for Coverage-Guided Fuzzing., , , , , , and . USENIX ATC, page 147-159. USENIX Association, (2021)Dodrio: Parallelizing Taint Analysis Based Fuzzing via Redundancy-Free Scheduling., , , , , and . SIGSOFT FSE Companion, page 244-254. ACM, (2024)Industry practice of coverage-guided enterprise Linux kernel fuzzing., , , , , , , , and . ESEC/SIGSOFT FSE, page 986-995. ACM, (2019)An Automatic Personalized Internal Fixation Plate Modeling Framework for Minimally Invasive Curved Bone Fracture Surgery Based on Preregistration With Capsule Projection Model., , , , , , , and . IEEE Trans. Biomed. Eng., 67 (3): 706-717 (2020)Robust and Efficient Corner Detection for Computer Vision.. University of New South Wales, Sydney, Australia, (2022)base-search.net (ftunswworks:oai:unsworks.library.unsw.edu.au:1959.4/100035).Premise Selection for Theorem Proving by Deep Graph Embedding., , , and . NIPS, page 2786-2796. (2017)Minerva: browser API fuzzing with dynamic mod-ref analysis., , , , , , , and . ESEC/SIGSOFT FSE, page 1135-1147. ACM, (2022)Limits of I/O Based Ransomware Detection: An Imitation Based Attack., , , , , , , and . SP, page 2584-2601. IEEE, (2023)Mozi: Discovering DBMS Bugs via Configuration-Based Equivalent Transformation., , , , , and . ICSE, page 135:1-135:12. ACM, (2024)