Cited By
View all- Huang YShi CLu JLi HMeng HLi LLuo BLiao XXu JKirda ELie D(2024)Detecting Broken Object-Level Authorization Vulnerabilities in Database-Backed ApplicationsProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690227(2934-2948)Online publication date: 2-Dec-2024
- Belgacem HLi XBianculli DBriand L(2024)Learning-based Relaxation of Completeness Requirements for Data Entry FormsACM Transactions on Software Engineering and Methodology10.1145/363570833:3(1-32)Online publication date: 15-Mar-2024
- Wang TZhi CZhou XWu JYin JDeng SJust RFraser G(2023)Data Constraint Mining for Automatic Reconciliation Scripts GenerationProceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3597926.3598122(1119-1130)Online publication date: 12-Jul-2023
- Show More Cited By