Author of the publication

Detecting Vulnerable Android Inter-App Communication in Dynamically Loaded Code.

, , , , , , and . INFOCOM, page 550-558. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards best secure coding practice for implementing SSL/TLS., and . INFOCOM Workshops, page 1-6. IEEE, (2018)A mobile malware detection method using behavior features in network traffic., , , , , and . J. Netw. Comput. Appl., (2019)A First Look at Android Malware Traffic in First Few Minutes., , , , , , and . TrustCom/BigDataSE/ISPA (1), page 206-213. IEEE, (2015)Privacy-Preserving and Residential Context-Aware Online Learning for IoT-Enabled Energy Saving With Big Data Support in Smart Home Environment., , , , , , , and . IEEE Internet Things J., 6 (5): 7450-7468 (2019)Design and analysis of elastic handoff in cognitive cellular networks., , , , and . ICC, page 1-6. IEEE, (2017)Efficient Signature Generation for Classifying Cross-Architecture IoT Malware., , , , and . CNS, page 1-9. IEEE, (2018)Automatically predicting cyber attack preference with attributed heterogeneous attention networks and transductive learning., , , , , , and . Comput. Secur., (2021)Security Threat Mitigation For Smart Contracts: A Survey., , , , , and . CoRR, (2023)Security and Privacy in the Emerging Cyber-Physical World: A Survey., , , and . CoRR, (2021)A Comprehensive Survey on Pretrained Foundation Models: A History from BERT to ChatGPT., , , , , , , , , and 9 other author(s). CoRR, (2023)