2022 article
Dazzle: Using Optimized Generative Adversarial Networks to Address Security Data Class Imbalance Issue
2022 MINING SOFTWARE REPOSITORIES CONFERENCE (MSR 2022), pp. 144–155.
2022 journal article
Do I really need all this work to find vulnerabilities? An empirical case study comparing vulnerability detection techniques on a Java application
EMPIRICAL SOFTWARE ENGINEERING, 27(6).
2022 journal article
Predicting health indicators for open source projects (using hyperparameter optimization)
EMPIRICAL SOFTWARE ENGINEERING, 27(6).
2021 journal article
How to Better Distinguish Security Bug Reports (Using Dual Hyperparameter Optimization)
EMPIRICAL SOFTWARE ENGINEERING, 26(3).
2021 journal article
Omni: automated ensemble with unexpected models against adversarial evasion attack
EMPIRICAL SOFTWARE ENGINEERING, 27(1).
2021 article
Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard
2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: JOINT TRACK ON SOFTWARE ENGINEERING EDUCATION AND TRAINING (ICSE-JSEET 2021), pp. 95–104.
2020 journal article
Sequential Model Optimization for Software Effort Estimation
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 48(6), 1994–2009.
2016 journal article
A Study of Security Isolation Techniques
ACM COMPUTING SURVEYS, 49(3).
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.