Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Message from the Chairs: ASE 2023., , , and . ASE, page xxxii-xxxv. IEEE, (2023)Learning to spot and refactor inconsistent method names., , , , , , , and . ICSE, page 1-12. IEEE / ACM, (2019)What You See is What it Means! Semantic Representation Learning of Code based on Visualization and Transfer Learning., , , , , and . ACM Trans. Softw. Eng. Methodol., 31 (2): 31:1-31:34 (2022)Demystifying Hidden Sensitive Operations in Android Apps., , , , , , , and . ACM Trans. Softw. Eng. Methodol., 32 (2): 50:1-50:30 (April 2023)Why Is Static Application Security Testing Hard to Learn?, , , , and . IEEE Secur. Priv., 21 (5): 68-72 (September 2023)IBIR: Bug Report driven Fault Injection., , , , , , and . CoRR, (2020)App Review Driven Collaborative Bug Finding., , , , , and . CoRR, (2023)Automatic Generation of Test Cases based on Bug Reports: a Feasibility Study with Large Language Models., , , and . CoRR, (2023)Automated Comment Update: How Far are We?, , , , and . ICPC, page 36-46. IEEE, (2021)Bench4BL: reproducibility study on the performance of IR-based bug localization., , , , and . ISSTA, page 61-72. ACM, (2018)