Author of the publication

ActivityHijacker: Hijacking the Android Activity Component for Sensitive Data.

, , , , and . ICCCN, page 1-9. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast In-Memory Transaction Processing Using RDMA and HTM., , , , , , , and . ACM Trans. Comput. Syst., 35 (1): 3:1-3:37 (2017)Ad Hoc Transactions: What They Are and Why We Should Care., , , , , , and . SIGMOD Rec., 52 (1): 7-15 (2023)The Spatial Mechanism and Predication of Rural Tourism Development in China: A Random Forest Regression Analysis., , and . ISPRS Int. J. Geo Inf., 12 (8): 321 (August 2023)Replication-Based Fault-Tolerance for Large-Scale Graph Processing., , , , , , , and . IEEE Trans. Parallel Distributed Syst., 29 (7): 1621-1635 (2018)A Combined Neural and Genetic Algorithm Model for Data Center Temperature Control., , , , and . CIMA@ICTAI, volume 2252 of CEUR Workshop Proceedings, page 58-69. CEUR-WS.org, (2018)Droid-Sec: deep learning in android malware detection., , , and . SIGCOMM, page 371-372. ACM, (2014)The Concurrent Learned Indexes for Multicore Data Storage., , , , and . ACM Trans. Storage, 18 (1): 8:1-8:35 (2022)On the Parallels between Paxos and Raft, and how to Port Optimizations., , , , and . PODC, page 445-454. ACM, (2019)Construction of a feature enhancement network for small object detection., , , , , and . Pattern Recognit., (November 2023)Efficient and Available In-Memory KV-Store with Hybrid Erasure Coding and Replication., , , , , , and . ACM Trans. Storage, 13 (3): 25:1-25:30 (2017)