Cited By
View all- Zheng XWei CWang SZhao YGao PZhang YWang KWang HFilkov VRay BZhou M(2024)Towards Robust Detection of Open Source Software Supply Chain Poisoning Attacks in Industry EnvironmentsProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695262(1990-2001)Online publication date: 27-Oct-2024
- Yang CDeng YLu RYao JLiu JJabbarvand RZhang L(2024)WhiteFox: White-Box Compiler Fuzzing Empowered by Large Language ModelsProceedings of the ACM on Programming Languages10.1145/36897368:OOPSLA2(709-735)Online publication date: 8-Oct-2024
- Go GZhou CZhang QZou XShi HJiang YChristakis MPradel M(2024)Towards More Complete Constraints for Deep Learning Library Testing via Complementary Set Guided RefinementProceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3650212.3680364(1338-1350)Online publication date: 11-Sep-2024
- Show More Cited By