Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

When program analysis meets mobile security: an industrial study of misusing Android internet sockets., , , , , and . ESEC/SIGSOFT FSE, page 842-847. ACM, (2017)Measuring and Understanding Crowdturfing in the App Store., , , , and . Inf., 14 (7): 393 (2023)Lifting The Grey Curtain: A First Look at the Ecosystem of CULPRITWARE., , , , , , , , and . CoRR, (2021)DsVD: An Effective Low-Overhead Dynamic Software Vulnerability Discoverer., , , , , and . ISADS, page 372-377. IEEE Computer Society, (2011)Measurement of the Usage of Web Clips in Underground Economy., , , , , , and . CoRR, (2022)Securing android applications via edge assistant third-party library detection., , , , , , , and . Comput. Secur., (2019)StormDroid: A Streaminglized Machine Learning-Based System for Detecting Android Malware., , , , and . AsiaCCS, page 377-388. ACM, (2016)When Similarity Digest Meets Vector Management System: A Survey on Similarity Hash Function., , , and . CoRR, (2021)Automatic Detection of SIP-Aware Attacks on VoLTE Device., , , , , and . VTC Fall, page 1-5. IEEE, (2016)A large-scale empirical study on industrial fake apps., , , , , , and . ICSE (SEIP), page 183-192. IEEE / ACM, (2019)