PRISM: platform for remote sensing using smartphones T Das, P Mohan, VN Padmanabhan, R Ramjee, A Sharma Proceedings of the 8th international conference on Mobile systems …, 2010 | 420 | 2010 |
Automated identification of security issues from commit messages and bug reports Y Zhou, A Sharma Proceedings of the 2017 11th joint meeting on foundations of software …, 2017 | 190 | 2017 |
Out of sight, out of mind? How vulnerable dependencies affect open-source projects GAA Prana, A Sharma, LK Shar, D Foo, AE Santosa, A Sharma, D Lo Empirical Software Engineering 26, 1-34, 2021 | 64 | 2021 |
A machine learning approach for vulnerability curation Y Chen, AE Santosa, AM Yi, A Sharma, A Sharma, D Lo Proceedings of the 17th International Conference on Mining Software …, 2020 | 45 | 2020 |
Efficient static checking of library updates D Foo, H Chua, J Yeo, MY Ang, A Sharma Proceedings of the 2018 26th ACM Joint Meeting on European Software …, 2018 | 38 | 2018 |
Automated Identification of Libraries from Vulnerability Data Y Chen, AE Santosa, A Sharma, D Lo ICSE (SEIP), 2020 | 30 | 2020 |
Open-source software vulnerability analysis DTW Foo, MY Ang, JS Yeo, A Sharma US Patent App. 16/050,050, 2020 | 29 | 2020 |
The Dynamics of Software Composition Analysis D Foo, J Yeo, H Xiao, A Sharma ASE (LBR) 2019, 2019 | 25 | 2019 |
Hermes: Using commit-issue linking to detect vulnerability-fixing commits G Nguyen-Truong, HJ Kang, D Lo, A Sharma, AE Santosa, A Sharma, ... 2022 IEEE International Conference on Software Analysis, Evolution and …, 2022 | 22 | 2022 |
Towards complete specifications with an error calculus QL Le, A Sharma, F Craciun, WN Chin NASA Formal Methods: 5th International Symposium, NFM 2013, Moffett Field …, 2013 | 20 | 2013 |
A refinement calculus for Promela A Sharma 2013 18th International Conference on Engineering of Complex Computer …, 2013 | 16 | 2013 |
Displaying content on multiple web pages A Sharma, PK Dhingra US Patent App. 12/623,458, 2011 | 15 | 2011 |
Exploiting undefined behaviors for efficient symbolic execution A Sharma Companion Proceedings of the 36th International Conference on Software …, 2014 | 13 | 2014 |
Open source vulnerability prediction with machine learning ensemble A Sharma, Y Zhou US Patent 11,416,622, 2022 | 11 | 2022 |
Automated identification of libraries from vulnerability data: Can we do better? SA Haryono, HJ Kang, A Sharma, A Sharma, A Santosa, AM Yi, D Lo Proceedings of the 30th IEEE/ACM International Conference on Program …, 2022 | 11 | 2022 |
End to end verification and validation with SPIN A Sharma arXiv preprint arXiv:1302.4796, 2013 | 10 | 2013 |
Towards a verified cardiac pacemaker A Sharma NUSTechnical Report, 2010 | 9 | 2010 |
Ontology Matching Using Weighted Graphs A Sharma Digital Information Management, 2006 1st International Conference on, 121-124, 2006 | 8 | 2006 |
Certified Reasoning with Infinity A Sharma, S Wang, A Costea, A Hobor, WN Chin FM 2015: Formal Methods, 496-513, 2015 | 7 | 2015 |
A Critical Review of Dynamic Taint Analysis and Forward Symbolic Execution A Sharma | 7 | 2012 |