Author of the publication

DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis.

, , , , , and . IEEE Trans. Inf. Forensics Secur., 12 (8): 1772-1785 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Introduction to the special issue on "Mechanism Design in E-commerce and Information Systems"., , and . Decis. Support Syst., (2013)All-trans retinoic acids induce differentiation and sensitize a radioresistant breast cancer cells to chemotherapy, , , , , , , , , and . BMC Complementary and Alternative Medicine, (2016)Information technology and organizational capabilities: A longitudinal study of the apparel industry., , and . Decis. Support Syst., 53 (1): 186-194 (2012)Does social network always promote entrepreneurial intentions? An empirical study in China., and . Neural Comput. Appl., 24 (1): 21-26 (2014)SamCluster: An Integrated Scheme for Automatic Discovery of Sample Classes Using Gene Expression Profile., , and . Bioinform., 19 (7): 811-817 (2003)Haplotypes of catechol-O-methyltransferase modulate intelligence-related brain white matter integrity., , , , , , , , and . NeuroImage, 50 (1): 243-249 (2010)Thermal-aware energy minimization for real-time scheduling on multi-core systems., , , and . SIGBED Rev., 10 (2): 27 (2013)External Vehicle Positioning System Using Multiple Fish-Eye Surveillance Cameras for Indoor Parking Lots., , , and . IEEE Syst. J., 15 (4): 5107-5118 (2021)A Unified Framework for Analyzing and Detecting Malicious Examples of DNN Models., , , , , , and . CoRR, (2020)Do as You Say: Consistency Detection of Data Practice in Program Code and Privacy Policy in Mini-App., , , , , , , , and . CoRR, (2023)