Personensuche
X
?
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security ,
1
SoK: Where to Fuzz? Assessing Target Selection Methods in D..:
, In:
?
Data and Applications Security and Privacy XXXVII; Lecture Notes in Computer Science ,
2
CodeGraphSMOTE - Data Augmentation for Vulnerability Discov..:
, In:
?
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy ,
3
Detecting Backdoors in Collaboration Graphs of Software Rep..:
, In:
?
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security ,
4
Broken Promises: Measuring Confounding Effects in Learning-..:
, In:
?
Proceedings of the 39th Annual Computer Security Applications Conference ,
5
PAVUDI: Patch-based Vulnerability Discovery using Machine L..:
, In:
?
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P) ,
6
Hunting for Truth: Analyzing Explanation Methods in Learnin..:
, In:
?
Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security ,
7