Author of the publication

Truth in Advertising: The Hidden Cost of Mobile Ads for Software Developers.

, , , and . ICSE (1), page 100-110. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Empirical Study of Local Database Usage in Android Applications., , , and . ICSME, page 444-455. IEEE Computer Society, (2017)Shape Feature Analysis for Visual Speech and Speaker Recognition., and . ICAIC (3), volume 226 of Communications in Computer and Information Science, page 167-174. Springer, (2011)APTrace: A Responsive System for Agile Enterprise Level Causality Analysis., , , , , , , , and . ICDE, page 1701-1712. IEEE, (2020)A Generic Edge-Empowered Graph Convolutional Network via Node-Edge Mutual Enhancement., , , , , and . WWW, page 2144-2154. ACM / IW3C2, (2020)ProvIoT : Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security., , , , , , , , , and 1 other author(s). ACNS (3), volume 14585 of Lecture Notes in Computer Science, page 241-268. Springer, (2024)Progressive processing of system-behavioral query., , , , and . ACSAC, page 378-389. ACM, (2019)Markov Chain-Based Routing Algorithm in Delay-Tolerant Networks., , , and . SAINT, page 161-165. IEEE Computer Society, (2012)Detecting display energy hotspots in Android apps., , , , , and . Softw. Test. Verification Reliab., (2017)Anomaly Detection on Web-User Behaviors Through Deep Learning., , , , and . SecureComm (1), volume 335 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 467-473. Springer, (2020)Heterogeneous Graph Matching Networks for Unknown Malware Detection., , , , , , , , , and . IJCAI, page 3762-3770. ijcai.org, (2019)