Cited By
View all- Xu JLiu YHe SLin HZhou YWang CCalandrino JTroncoso C(2023)MorFuzzProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620311(1307-1324)Online publication date: 9-Aug-2023
- Wang ZNie PMiao XChen YWan CBu LZhao JJust RFraser G(2023)GenCoG: A DSL-Based Approach to Generating Computation Graphs for TVM TestingProceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3597926.3598105(904-916)Online publication date: 12-Jul-2023
- Basset NDang TGigler FMateis CNičković DArun-Kumar SMery DSaha IZhang L(2021)Sampling of shape expressions with ShapExProceedings of the 19th ACM-IEEE International Conference on Formal Methods and Models for System Design10.1145/3487212.3487350(118-125)Online publication date: 20-Nov-2021
- Show More Cited By