Cited By
View all- Liu HJia ZLi SLei YYu YJiang YMao XLiao X(2024)Cut to the Chase: An Error-Oriented Approach to Detect Error-Handling BugsProceedings of the ACM on Software Engineering10.1145/36607871:FSE(1796-1818)Online publication date: 12-Jul-2024
- Hussain SNadeem MBaber JHamdi MRajab AAl Reshan MShaikh A(2024)Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based hybrid feature extractionScientific Reports10.1038/s41598-024-56871-z14:1Online publication date: 28-Mar-2024
- Gaidis AAtlidakis VKemerlis VMeng WJensen CCremers CKirda E(2023)SysXCHG: Refining Privilege with Adaptive System Call FiltersProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623137(1964-1978)Online publication date: 15-Nov-2023
- Show More Cited By