Author of the publication

MobiPlay: a remote execution based record-and-replay tool for mobile applications.

, , , and . ICSE, page 571-582. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defending Against Cooperative Attacks in Cooperative Spectrum Sensing., , and . IEEE Trans. Wirel. Commun., 12 (6): 2680-2687 (2013)Graphical passwords for older computer users., , , , , , and . HotWeb, page 7:1-7:7. ACM, (2017)An ELU Network with Total Variation for Image Denoising., , and . ICONIP (3), volume 10636 of Lecture Notes in Computer Science, page 227-237. Springer, (2017)IMDGuard: Securing implantable medical devices with the external wearable guardian., , , , and . INFOCOM, page 1862-1870. IEEE, (2011)Household Electrical Load Scheduling Algorithms with Renewable Energy., and . WASA, volume 10874 of Lecture Notes in Computer Science, page 387-399. Springer, (2018)Virtual machine migration for IoT applications., , , and . SEC, page 437-442. ACM, (2019)Distributed Protocol for Maximizing Sampling Frequency of Spectrum Reconnaissance UAV Clusters., , , and . WCNC, page 1-6. IEEE, (2024)vTrust: Remotely Executing Mobile Apps Transparently With Local Untrusted OS., , , , , , and . IEEE Trans. Computers, 71 (12): 3349-3360 (2022)Securing SDN Infrastructure of IoT-Fog Networks From MitM Attacks., , , and . IEEE Internet Things J., 4 (5): 1156-1164 (2017)Security and Privacy Issues of Fog Computing: A Survey., , and . WASA, volume 9204 of Lecture Notes in Computer Science, page 685-695. Springer, (2015)