Search alternatives:
"yi chao" » "li chao" (Expand Search), "ye chao" (Expand Search), "yu chao" (Expand Search)
"qi chao" » "li chao" (Expand Search), "qi hao" (Expand Search), "zi chao" (Expand Search)
"liu yang" » "liu wang" (Expand Search)
"yi chao" » "li chao" (Expand Search), "ye chao" (Expand Search), "yu chao" (Expand Search)
"qi chao" » "li chao" (Expand Search), "qi hao" (Expand Search), "zi chao" (Expand Search)
"liu yang" » "liu wang" (Expand Search)
-
61
Empirical comparison of the performance of popular vulnerability detection tools II
Published 2019Get full text
Final Year Project (FYP) -
62
-
63
Survey on software architecture design approaches and tools
Published 2014Get full text
Final Year Project (FYP) -
64
-
65
Machine translation of software-specific documentations
Published 2017Get full text
Final Year Project (FYP) -
66
-
67
Calibrating DFT Formation Enthalpy Calculations by Multifidelity Machine Learning
Published 2024Get full text
Article -
68
Automated vulnerability detection system based on commit messages
Published 2019Get full text
Get full text
Thesis -
69
Automatic PoC generation for Android app vulnerability
Published 2021Get full text
Final Year Project (FYP) -
70
Automated malware behaviour analysis for IoT technologies
Published 2023Get full text
Final Year Project (FYP) -
71
-
72
Phase diagram of superconducting vortex ratchet motion in a superlattice with noncentrosymmetry
Published 2023Get full text
Journal Article -
73
Evaluating & enhancing deep learning systems via out-of-distribution detection
Published 2022Get full text
Thesis-Doctor of Philosophy -
74
Semantic-based vulnerability analysis of software
Published 2020Get full text
Thesis-Doctor of Philosophy