Author of the publication

Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android.

, , , , and . NDSS, The Internet Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Local Importance Representation Convolutional Neural Network for Fine-Grained Image Classification., , and . Symmetry, 10 (10): 479 (2018)Privacy in the Genomic Era., , , , , , , and . ACM Comput. Surv., 48 (1): 6:1-6:44 (2015)Automated Segmentation Using a Fast Implementation of the Chan-Vese Models., and . ICIC (2), volume 5227 of Lecture Notes in Computer Science, page 1135-1141. Springer, (2008)A Semantic-Based Malware Detection System Design Based on Channels., , , , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 653-662. Springer, (2014)DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation., , , and . ICT-EurAsia, volume 7804 of Lecture Notes in Computer Science, page 271-284. Springer, (2013)Robust Adaptive Neural Network Control for Strict-Feedback Nonlinear Systems Via Small-Gain Approaches., , and . ISNN (2), volume 3972 of Lecture Notes in Computer Science, page 888-897. Springer, (2006)Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion., , , , , , , , and . IEEE Symposium on Security and Privacy, page 952-966. IEEE, (2019)Efficient implementation of linear multiuser detectors., , and . ICASSP, page 3221-3224. IEEE, (1998)A New Turbo Multi-User Receiver With Recursive SIC-MMSE Detection., and . WCNC, page 922-926. IEEE, (2007)Multi-Stage Mixed Attribute Outlier Detection Algorithm Based on Neighborhood Density Difference., , , , and . BigCom, page 160-168. IEEE, (2019)