Author of the publication

A VirtualXposed-Based Inline Hooking Framework for Android Native Methods.

, , , , , and . SocialSec, volume 1298 of Communications in Computer and Information Science, page 245-253. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Increasing temporal diversity with purchase intervals., , , and . SIGIR, page 165-174. ACM, (2012)Target Localization and Tracking in Noisy Binary Sensor Networks with Known Spatial Topology., , and . ICASSP (2), page 1029-1032. IEEE, (2007)A New System for Interactive Demonstration in Distance Education - The Research and Design of the Smart Classroom based on Blending Reality., , and . GrC, page 121-124. IEEE, (2008)Early warning monitoring and management of disasters., , and . IGARSS, page 2996-2999. IEEE, (2007)A Heuristic Q-Learning Architecture for Fully Exploring a World and Deriving an Optimal Policy by Model-Based Planning., , and . ICRA, page 2078-2083. IEEE Robotics and Automation Society, (1999)Code Definition Analysis for Call Graph Generation., , , , , and . CoRR, (2016)Utilizing Purchase Intervals in Latent Clusters for Product Recommendation., , and . SNAKDD, page 4:1-4:9. ACM, (2014)Efficient GPU out-of-core visualization of large-scale CAD models with voxel representations., , and . Adv. Eng. Softw., (2016)NASA's MODIS/VIIRS Global Water Reservoir Product Suite from Moderate Resolution Remote Sensing Data., , , , , , , , and . Remote. Sens., 13 (4): 565 (2021)ERSChain: Towards secure and flexible educational resource sharing using consortium blockchain and revocable ciphertext-policy attribute-based encryption., , , and . Concurr. Comput. Pract. Exp., (2024)