Author of the publication

Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System.

, , , , , and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 379-390. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System., , , , , and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 379-390. Springer, (2015)Single-Image Super-Resolution via Multiple Matrix-Valued Kernel Regression., , and . ICMLC, page 1-7. IEEE, (2019)Preference Modeling by Exploiting Latent Components of Ratings., , , and . CoRR, (2017)Frame rate up-conversion based on dual criterion motion estimation and motion vector adjustment., and . Signal Image Video Process., 9 (8): 1861-1869 (2015)QoS Deployment Strategies Evaluation in PTN based Power Communication Networks., , and . J. Softw., 8 (11): 2855-2862 (2013)Distributed Logistics Resources Allocation with Blockchain, Smart Contract, and Edge Computing., , , , , and . J. Circuits Syst. Comput., 32 (7): 2350121:1-2350121:22 (May 2023)Study on Customized Shuttle Transit Mode Responding to Spatiotemporal Inhomogeneous Demand in Super-Peak., , and . Inf., 12 (10): 429 (2021)Lung Cancer Diagnosis Using Deep Attention Based on Multiple Instance Learning and Radiomics., , , , , , and . CoRR, (2021)Generative Models Improve Radiomics Reproducibility in Low Dose CTs: A Simulation Study., , , , , , and . CoRR, (2021)Revisiting Alternative Experimental Settings for Evaluating Top-N Item Recommendation Algorithms., , , , and . CIKM, page 2329-2332. ACM, (2020)