Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Battery-Aware Mobile Data Service., , , , , , , and . IEEE Trans. Mob. Comput., 16 (6): 1544-1558 (2017)Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique., , , , , , and . IEEE Trans. Inf. Forensics Secur., 12 (7): 1529-1544 (2017)SEPAL: Towards a Large-scale Analysis of SEAndroid Policy Customization., , , , , , , , , and 2 other author(s). WWW, page 2733-2744. ACM / IW3C2, (2021)Are our clone detectors good enough? An empirical study of code effects by obfuscation., , , , , and . Cybersecur., 6 (1): 14 (December 2023)TraceDroid: A Robust Network Traffic Analysis Framework for Privacy Leakage in Android Apps., , , , , , , and . SciSec, volume 13580 of Lecture Notes in Computer Science, page 541-556. Springer, (2022)FMDiv: Functional Module Division on Binary Malware for Accurate Malicious Code Localization., , , , , , and . CSCWD, page 947-952. IEEE, (2023)DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models., , , , , and . AAAI, page 21850-21858. AAAI Press, (2024)MobiDroid: A Performance-Sensitive Malware Detection System on Mobile Platform., , , , , , and . ICECCS, page 61-70. IEEE, (2019)Contextual Weisfeiler-Lehman graph kernel for malware detection., , , , and . IJCNN, page 4701-4708. IEEE, (2016)Semantic modelling of Android malware for effective malware comprehension, detection, and classification., , , , , and . ISSTA, page 306-317. ACM, (2016)