Cited By
View all- Sun XGao XCao SBo LWu XHuang KFilkov VRay BZhou M(2024)1+1>2: Integrating Deep Code Behaviors with Metadata Features for Malicious PyPI Package DetectionProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695493(1159-1170)Online publication date: 27-Oct-2024
- Drosos GSotiropoulos TSpinellis DMitropoulos D(2024)Bloat beneath Python’s Scales: A Fine-Grained Inter-Project Dependency AnalysisProceedings of the ACM on Software Engineering10.1145/36608211:FSE(2584-2607)Online publication date: 12-Jul-2024
- Helm DKeidel SKampkötter ADüsing JRoth THermann BMezini MChristakis MPradel M(2024)Total Recall? How Good Are Static Call Graphs Really?Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3650212.3652114(112-123)Online publication date: 11-Sep-2024
- Show More Cited By