no code implementations • 23 May 2019 • Wookhyun Han, Md Lutfor Rahman, Yuxuan Chen, Chengyu Song, Byoungyoung Lee, Insik Shin
Then it uses oracle-guided program synthesis to reconstruct the symbolic expression based on input-output pairs.
Cryptography and Security