Author of the publication

Learning Program Semantics for Vulnerability Detection via Vulnerability-Specific Inter-procedural Slicing.

, , , , , and . ESEC/SIGSOFT FSE, page 1371-1383. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Holistic Automated Software Structure Exploration Framework for Testing., , , , and . SoMeT, volume 355 of Frontiers in Artificial Intelligence and Applications, page 286-297. IOS Press, (2022)Model Checking Prioritized Timed Automata., , , and . ATVA, volume 3707 of Lecture Notes in Computer Science, page 370-384. Springer, (2005)Model Checking Timed Systems with Urgencies., , , , , , , and . ATVA, volume 4218 of Lecture Notes in Computer Science, page 67-81. Springer, (2006)SeqMobile: A Sequence Based Efficient Android Malware Detection System Using RNN on Mobile Devices., , , , and . CoRR, (2020)Vultron: catching vulnerable smart contracts once and for all., , , , and . ICSE (NIER), page 1-4. IEEE / ACM, (2019)A Generalized Formal Semantic Framework for Smart Contracts., , and . FASE, volume 12076 of Lecture Notes in Computer Science, page 75-96. Springer, (2020)Learning Performance Optimization from Code Changes for Android Apps., , , , , and . ICST Workshops, page 285-290. IEEE, (2019)Towards Network Virtualization Management for Federated Cloud Systems., , and . IEEE CLOUD, page 597. IEEE Computer Society, (2013)From Monolithic Systems to a Federated e-Learning Cloud System., and . IC2E, page 156-165. IEEE Computer Society, (2013)Automatic HMI Structure Exploration Via Curiosity-Based Reinforcement Learning., , , , , , and . ASE, page 1151-1155. IEEE, (2021)