Cited By
View all- Brown MMeily AFairservice BSood ADorn JBits TEytchison RBalzarotti DXu W(2024)A broad comparative evaluation of software debloating toolsProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699120(3927-3943)Online publication date: 14-Aug-2024
- Zhang HAlhanahnah MAhmed FFatih DLeitner PAli-Eldin A(2024)Machine Learning Systems are Bloated and VulnerableProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/36390328:1(1-30)Online publication date: 21-Feb-2024
- Ghavamnia SPalit TPolychronakis MYin HStavrou ACremers CShi E(2022)C2CProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security10.1145/3548606.3559366(1243-1257)Online publication date: 7-Nov-2022
- Show More Cited By