Author of the publication

LeakProber: a framework for profiling sensitive data leakage paths.

, , , and . CODASPY, page 75-84. ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparison and Enlightenment of International Evaluation Index System of Scientific Research Institutions., , , , , and . ICISCAE (ACM), page 2467-2474. ACM, (2021)LraSched: Admitting More Long-Running Applications via Auto-Estimating Container Size and Affinity., , and . Comput. J., 65 (9): 2377-2391 (2022)Research on Library Knowledge Recommendation Based on Intelligent Discovery System., , , , , , and . RICAI, page 170-174. ACM, (2020)Case Reasoning Research of Emergency Network Opinion Based on Ontology., , , , , , and . ISCID (1), page 7-10. IEEE, (2019)Medical long-distance monitoring system based on internet of things., , , and . EURASIP J. Wirel. Commun. Netw., (2018)SemanticLoop: Loop Closure With 3D Semantic Graph Matching., and . IEEE Robotics Autom. Lett., 8 (2): 568-575 (2023)Variational learning of deep fuzzy theoretic nonparametric model., , , , and . Neurocomputing, (2022)Remote sensing image mosaic technology based on SURF algorithm in agriculture., , , , and . EURASIP J. Image Video Process., (2018)Measuring Botnet Size by Using URL and Collaborative MailServers., , , and . ICNS, page 161-164. IEEE Computer Society, (2009)DroidScreening: a practical framework for real-world Android malware analysis., , and . Secur. Commun. Networks, 9 (11): 1435-1449 (2016)