Author of the publication

FOT: a versatile, configurable, extensible fuzzing framework.

, , , , and . ESEC/SIGSOFT FSE, page 867-870. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain-Based Implementation for Financial Product Management., , and . ITNAC, page 1-3. IEEE Computer Society, (2018)Survivability-oriented self-tuning of web systems., , , and . WWW (Companion Volume), page 23-24. ACM, (2011)DeepLink: Recovering issue-commit links based on deep learning., , , and . Journal of Systems and Software, (2019)Superion: grammar-aware greybox fuzzing., , , and . ICSE, page 724-735. IEEE / ACM, (2019)Demystifying the Vulnerability Propagation and Its Evolution via Dependency Trees in the NPM Ecosystem., , , , , and . CoRR, (2022)Are your sites down? Requirements-driven self-tuning for the survivability of Web systems., , , and . RE, page 219-228. IEEE Computer Society, (2011)Proteus: computing disjunctive loop summary via path dependency analysis., , , , and . SIGSOFT FSE, page 61-72. ACM, (2016)Loopster: static loop termination analysis., , , , , and . ESEC/SIGSOFT FSE, page 84-94. ACM, (2017)Leopard: identifying vulnerable code for vulnerability assessment through program metrics., , , , , , and . ICSE, page 60-71. IEEE / ACM, (2019)Requirements-Driven Self-Optimization of Composite Services Using Feedback Control., , , and . IEEE Trans. Services Computing, 8 (1): 107-120 (2015)