Cited By
View all- Makhdoom IAbolhasan MLipman JShariati NFranklin DPiccardi M(2024)Securing Personally Identifiable Information: A Survey of SOTA Techniques, and a Way ForwardIEEE Access10.1109/ACCESS.2024.344701712(116740-116770)Online publication date: 2024
- Wang RWang SYan HWang XWilliams BChen YNeville J(2023)WSiPProceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence and Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence and Thirteenth Symposium on Educational Advances in Artificial Intelligence10.1609/aaai.v37i4.25592(4685-4692)Online publication date: 7-Feb-2023
- Sarker JTurzo ADong MBosu A(2023)Automated Identification of Toxic Code Reviews Using ToxiCRACM Transactions on Software Engineering and Methodology10.1145/358356232:5(1-32)Online publication date: 22-Jul-2023
- Show More Cited By