Follow
Seemanta Saha
Seemanta Saha
AI Software Development Engineer, Intel Corporation
Verified email at cs.ucsb.edu - Homepage
Title
Cited by
Cited by
Year
Harnessing evolution for multi-hunk program repair
S Saha, R Saha, M Prasad
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
119*2019
Symbolic path cost analysis for side-channel detection
T Brennan, S Saha, T Bultan, CS Păsăreanu
Proceedings of the 27th ACM SIGSOFT International Symposium on Software …, 2018
412018
Jvm fuzzing for jit-induced side-channel detection
T Brennan, S Saha, T Bultan
Proceedings of the ACM/IEEE 42nd international conference on software …, 2020
272020
Incremental Attack Synthesis
S Saha, W Eiers, IB Kadron, L Bang, T Bultan
ACM SIGSOFT Software Engineering Notes 44 (4), 16-16, 2019
11*2019
Variable dependency analysis of a computer program
MS Sadi, L Halder, S Saha
2013 International Conference on Electrical Information and Communication …, 2014
112014
Subformula caching for model counting and quantitative program analysis
W Eiers, S Saha, T Brennan, T Bultan
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
82019
Attack synthesis for strings using meta-heuristics
IB Saha, Seemanta: Kadron, W Eiers, T Bang, Lucas, Bultan
ACM SIGSOFT Software Engineering Notes 43 (4), 56, 2018
8*2018
Validation of deep neural network (dnn) prediction based on pre-trained classifier
RK Saha, MR Prasad, S Saha
US Patent US20210303986A1, 2021
62021
PReach: A Heuristic for Probabilistic Reachability to Identify Hard to Reach Statements
S Saha, M Downing, T Brennan, T Bultan
2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE), 2022
52022
Synthesizing fault tolerant safety critical systems
S Saha, MS Sadi
2012 15th International Conference on Computer and Information Technology …, 2012
32012
Rare path guided fuzzing
S Saha, L Sarker, M Shafiuzzaman, C Shou, A Li, G Sankaran, T Bultan
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
22023
Obtaining Information Leakage Bounds via Approximate Model Counting
S Saha, S Ghentiyala, S Lu, L Bang, T Bultan
Proceedings of the ACM on Programming Languages 7 (PLDI), 1488-1509, 2023
22023
The Java Pathfinder Workshop 2019
C Artho, QS Phan, P Aldous, A Almaawi, L Bang, L Berglund, T Bultan, ...
ACM SIGSOFT Software Engineering Notes 45 (2), 20-22, 2020
12020
Symbolic Quantitative Analysis for Software Testing and Security
S Saha
University of California, Santa Barbara, 2022
2022
Towards Multi-Bit Error’s Detection by Analyzing Variable Dependency
MS Sadi, MS Kaiser, L Halder, S Saha
International Journal of Software Engineering and Its Applications 11 (1), 1-16, 2017
2017
External Reviewers of ICSE 2020
S Abualhaija, J Aldrich, C Arora, S Benton, S Blackshear, T Brennan, ...
The system can't perform the operation now. Try again later.
Articles 1–16