Author of the publication

Learning Program Semantics for Vulnerability Detection via Vulnerability-Specific Inter-procedural Slicing.

, , , , , and . ESEC/SIGSOFT FSE, page 1371-1383. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pedestrian Recognition Based on SVM., and . IMECS, page 60-63. Newswood Limited, (2006)A New Model for the Error Detection Delay of Finite Precision Binary Arithmetic Codes with a Forbidden Symbol., , , and . IEICE Trans. Commun., 91-B (9): 2987-2990 (2008)Cross-layer optimization schemes based on HARQ for Device-to-Device communication., , and . ComComAP, page 72-77. IEEE, (2014)Electromigration-induced stress in a confined bamboo interconnect with randomly distributed grain sizes., , , , and . Microelectron. Reliab., 50 (3): 391-397 (2010)An Efficient Encoding Method for Video Compositing in HEVC., , and . MMM (1), volume 11961 of Lecture Notes in Computer Science, page 65-76. Springer, (2020)Finite-Time Analysis of Decentralized Temporal-Difference Learning with Linear Function Approximation., , , , and . AISTATS, volume 108 of Proceedings of Machine Learning Research, page 4485-4495. PMLR, (2020)User-Centered Changes in Workflow Agreement and Solution Satisfaction: An Expectation-Confirmation Perspective., and . AMCIS, Association for Information Systems, (2018)Individual Privacy Empowerment in Electronic Service., and . AMCIS, Association for Information Systems, (2020)Key Influencing Factors for Cross-organizational R & D Project Stakeholder Management., , , , and . IEEM, page 651-655. IEEE, (2018)Battery-Assisted Online Operation of Distributed Data Centers With Uncertain Workload and Electricity Prices., , , , and . IEEE Trans. Cloud Comput., 11 (2): 1303-1314 (April 2023)