Author of the publication

PMC: A Privacy-preserving Deep Learning Model Customization Framework for Edge Computing.

, , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 4 (4): 139:1-139:25 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding Application-Battery Interactions on Smartphones: A Large-Scale Empirical Study., , and . IEEE Access, (2017)DistFL: Distribution-aware Federated Learning for Mobile Scenarios., , , , , , , and . CoRR, (2021)On Generalizing Interrupt Handling into a Flexible Binding Model for Kernel Components., , and . ICESS, volume 3605 of Lecture Notes in Computer Science, page 423-429. Springer, (2004)The Vulnerability Is in the Details: Locating Fine-grained Information of Vulnerable Code Identified by Graph-based Detectors., , , , , , , , and . CoRR, (2024)Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools., , , , , , , , , and 1 other author(s). CCS, page 2396-2410. ACM, (2023)Automated Aspect Recommendation through Clustering-Based Fan-in Analysis., , and . ASE, page 278-287. IEEE Computer Society, (2008)A Lightweight Dynamic Performance Monitoring Framework for Embedded Systems., , and . ICESS, page 256-262. IEEE Computer Society, (2009)SAConf: Semantic Attestation of Software Configurations., , and . ATC, volume 5586 of Lecture Notes in Computer Science, page 120-133. Springer, (2009)PERUIM: understanding mobile application privacy with permission-UI mapping., , and . UbiComp, page 682-693. ACM, (2016)DPAC: A Reuse-Oriented Password Authentication Framework for Improving Password Security., , and . HASE, page 475-478. IEEE Computer Society, (2008)