From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Automatic Verification of RMA Programs via Abstraction Extrapolation., , , , и . VMCAI, том 10747 из Lecture Notes in Computer Science, стр. 47-70. Springer, (2018)Abstraction-guided synthesis of synchronization., , и . POPL, стр. 327-338. ACM, (2010)Scalable race detection for Android applications., , и . OOPSLA, стр. 332-348. ACM, (2015)CGCExplorer: a semi-automated search procedure for provably correct concurrent collectors., , , и . PLDI, стр. 456-467. ACM, (2007)Robustness certification with generative models., , , , и . PLDI, стр. 1141-1154. ACM, (2021)Scalable and precise dynamic datarace detection for structured parallelism., , , , и . PLDI, стр. 531-542. ACM, (2012)Scalable Polyhedral Verification of Recurrent Neural Networks., , , , , и . CAV (1), том 12759 из Lecture Notes in Computer Science, стр. 225-248. Springer, (2021)Group and Attack: Auditing Differential Privacy., , , и . CCS, стр. 1905-1918. ACM, (2023)Adversarial Training and Provable Defenses: Bridging the Gap., и . ICLR, OpenReview.net, (2020)DP-Finder: Finding Differential Privacy Violations by Sampling and Optimization., , , , и . ACM Conference on Computer and Communications Security, стр. 508-524. ACM, (2018)