Author of the publication

Automatic Detection for Privacy Violations in Android Applications.

, , , and . IEEE Internet Things J., 9 (8): 6159-6172 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A2L: Angle to Landmarks Based Method Positioning for Wireless Sensor Networks., , and . ICC, page 3301-3306. IEEE, (2007)HA-A2L: angle to landmark-based high accuracy localization method in sensor networks., , and . IWCMC, page 475-480. ACM, (2007)Energy and mobility aware clustering technique for multicast routing protocols in wireless ad hoc networks., , and . WCNC, page 2150-2155. IEEE, (2009)Optimal mobile beacon trajectories for nodes localisation in wireless sensor networks., , , and . Int. J. Ad Hoc Ubiquitous Comput., 29 (1/2): 64-76 (2018)Protocol Validation: A Parallel Technique to Reduce the Reachability Tree.. PARLE, volume 817 of Lecture Notes in Computer Science, page 109-121. Springer, (1994)Impacts and solutions of control packets vulnerabilities with IEEE 802.11 MAC., and . Wirel. Commun. Mob. Comput., 9 (4): 469-488 (2009)Emergency Networks and Future Public Safety Systems., , and . Wirel. Commun. Mob. Comput., (2019)On semantic clustering and adaptive robust regression based energy-aware communication with true outliers detection in WSN., , , and . Ad Hoc Networks, (2019)Security and Pseudo-Anonymity with a Cluster-Based Approach for MANET., and . GLOBECOM, page 1956-1961. IEEE, (2008)Robust Enhancement of Intrusion Detection Systems Using Deep Reinforcement Learning and Stochastic Game., , , , and . IEEE Trans. Veh. Technol., 71 (10): 11089-11102 (2022)