Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Music Sheet Understanding and Tone Transposition., , , , , and . ICMLSC, page 66-71. ACM, (2022)iGlow: Visualizing a Person's Energy Level Through Hand Motion., , and . HCI (35), volume 1034 of Communications in Computer and Information Science, page 452-456. Springer, (2019)Diverse Search Methods and Multi-Modal Fusion for High-Performance Video Retrieval., , , , , , , , and . SoICT, page 997-1002. ACM, (2023)DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning., , , and . ASE, page 717-729. IEEE, (2021)On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models., and . MSR, page 621-633. ACM, (2022)Linear support vector machine to classify the vibrational modes for complex chemical systems., , and . ICMLSC, page 10-14. ACM, (2018)A Large-scale Study of Security Vulnerability Support on Developer Q&A Websites., , , and . EASE, page 109-118. ACM, (2021)Automated Security Assessment for the Internet of Things., , , , , , and . PRDC, page 47-56. IEEE, (2021)Automated software vulnerability assessment with concept drift., , and . MSR, page 371-382. IEEE / ACM, (2019)Are Latent Vulnerabilities Hidden Gems for Software Vulnerability Prediction? An Empirical Study., , and . MSR, page 716-727. ACM, (2024)