The Gas Burn Identity: Early Detection of Gas-Intensive Functions and Patterns in Smart Contracts - WETSEB/ICSE 2026
Datasets, bias, licenses, and terms of use: A large and longitudinal study ... - Empirical Software Engineering
Recovering Traceability Links Between Code and Documentation: A Retrospective. IEEE Trans. Software Eng.
Transformer or Autoencoder? Who is the ultimate adversary for attack detectors? - Int. Journal of Information Security
The Future of Software Transparency: Bridging Understanding, Measurement, and Practice - ASE'25
It’s Acting Odd! Exploring Equivocal Behaviors of Goodware - FSE'25
Behind Enemy Lines: Strengthening Android Malware Detection with Adversarial Training - ARES'25
Beyond Words: Stylometric Analysis for Detecting AI Manipulation on Social Media - ESORICS'24
La mia pagina su DBLP