Ganz, Tom
28  Ergebnisse:
Personensuche X
?
1

SoK: Where to Fuzz? Assessing Target Selection Methods in D..:

, In: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security,
Weissberg, Felix ; Möller, Jonas ; Ganz, Tom... - p. 1539-1553 , 2024
 
?
2

CodeGraphSMOTE - Data Augmentation for Vulnerability Discov..:

, In: Data and Applications Security and Privacy XXXVII; Lecture Notes in Computer Science,
Ganz, Tom ; Imgrund, Erik ; Härterich, Martin. - p. 282-301 , 2023
 
?
3

Detecting Backdoors in Collaboration Graphs of Software Rep..:

, In: Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy,
Ganz, Tom ; Ashraf, Inaam ; Härterich, Martin. - p. 189-200 , 2023
 
?
4

Broken Promises: Measuring Confounding Effects in Learning-..:

, In: Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security,
Imgrund, Erik ; Ganz, Tom ; Härterich, Martin... - p. 149-160 , 2023
 
?
5

PAVUDI: Patch-based Vulnerability Discovery using Machine L..:

, In: Proceedings of the 39th Annual Computer Security Applications Conference,
Ganz, Tom ; Imgrund, Erik ; Härterich, Martin. - p. 704-717 , 2023
 
?
6

Hunting for Truth: Analyzing Explanation Methods in Learnin..:

, In: 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P),
Ganz, Tom ; Rall, Philipp ; Harterich, Martin. - p. 524-541 , 2023
 
?
7

Explaining Graph Neural Networks for Vulnerability Discover:

, In: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security,
 
?
 
?
15

Magnetic Augmentation of the Lower Esophageal Sphincter: Re..:

Bonavina, Luigi ; Saino, Greta I. ; Bona, Davide...
Journal of Gastrointestinal Surgery.  12 (2008)  12 - p. 2133-2140 , 2008
 
1-15