Search for persons
X
?
Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses ,
3
Distinguishing AI- and Human-Generated Code: A Case Study:
, In:
?
Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses ,
5
(Nothing But) Many Eyes Make All Bugs Shallow:
, In:
?
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Security and Privacy in Communication Networks ,
7
Breaking Embedded Software Homogeneity with Protocol Mutati..:
, In:
?
Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems ,
9
Accessibility Evaluation of IoT Android Mobile Companion Ap..:
, In:
?
Proceedings of the 44th International Conference on Software Engineering ,
10
What the fork? : finding hidden code clones in npm:
, In:
?
Lecture Notes in Computer Science; Data and Applications Security and Privacy XXXVI ,
13
On the Data Privacy, Security, and Risk Postures of IoT Mob..:
, In:
?
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security ,
14
Wolf at the Door : Preventing Install-Time Attacks in np..:
, In:
?
2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE) ,
15