Author of the publication

Malicious Package Detection in NPM and PyPI using a Single Model of Malicious Behavior Sequence.

, , , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Survivability-oriented self-tuning of web systems., , , and . WWW (Companion Volume), page 23-24. ACM, (2011)Guardauto: A Decentralized Runtime Protection System for Autonomous Driving., , , , , and . IEEE Trans. Computers, 70 (10): 1569-1581 (2021)Superion: grammar-aware greybox fuzzing., , , and . ICSE, page 724-735. IEEE / ACM, (2019)Demystifying the Vulnerability Propagation and Its Evolution via Dependency Trees in the NPM Ecosystem., , , , , and . ICSE, page 672-684. ACM, (2022)Blockchain-Based Implementation for Financial Product Management., , and . ITNAC, page 1-3. IEEE Computer Society, (2018)Identifying Affected Libraries and Their Ecosystems for Open Source Software Vulnerabilities., , , , and . ICSE, page 162:1-162:12. ACM, (2024)Exploring the Potential of ChatGPT in Automated Code Refinement: An Empirical Study., , , , , , and . ICSE, page 34:1-34:13. ACM, (2024)Characterizing the Complexity and Its Impact on Testing in ML-Enabled Systems : A Case Sutdy on Rasa., , , , , , and . ICSME, page 258-270. IEEE, (2023)Interactive, effort-aware library version harmonization., , , , , and . ESEC/SIGSOFT FSE, page 518-529. ACM, (2020)Localized or architectural: an empirical study of performance issues dichotomy., , , , and . ICSE (Companion Volume), page 316-317. IEEE / ACM, (2019)