Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- LI LiProfessor of Software Engineering, Beihang UniversityVerified email at monash.edu
- John C. GrundyAustralian Laureate Fellow and Professor of Software Engineering, Faculty of IT, Monash UniversityVerified email at monash.edu
- Yanjie ZhaoHuazhong University of Science and TechnologyVerified email at hust.edu.cn
- Tegawendé F. BissyandéChief Scientist II / ERC Fellow / TruX @SnT, University of LuxembourgVerified email at uni.lu
- Jacques KleinUniversity of Luxembourg / SnTVerified email at uni.lu
- Jordan SamhiCISPA – Helmholtz Center for Information SecurityVerified email at cispa.de
- Jun GaoDoctoral researcher, University of LuxembourgVerified email at uni.lu
- Damien OcteauGoogleVerified email at google.com
- Kui LIUResearch Scientist at Software Engineering Application Technology Lab, Huawei Technologies Co., LtdVerified email at huawei.com
- Haipeng CaiWashington State UniversityVerified email at wsu.edu
- Chakkrit (Kla) TantithamthavornSenior Lecturer (DECRA Fellow, JSPS Fellow), Faculty of Information Technology, MonashVerified email at monash.edu
- Yue LiuMonash UniversityVerified email at monash.edu
- Chunyang ChenProfessor at Department of Computer Science, Technical University of MunichVerified email at tum.de
- Xiao ChenThe University of NewcastleVerified email at newcastle.edu.au
- Tao XiePeking University Chair Professor, Chair of Department of Software Science and Engineering@PKUVerified email at pku.edu.cn
- Hailong SunProfessor, Beihang UniversityVerified email at buaa.edu.cn
- Haoyu WANG (王浩宇)Full Professor@HUST <- BUPT <- PKUVerified email at hust.edu.cn