Author of the publication

ActivityHijacker: Hijacking the Android Activity Component for Sensitive Data.

, , , , and . ICCCN, page 1-9. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Multituple Packet Classification Using Dynamic Discrete Bit Selection., , , , and . IEEE Trans. Computers, 63 (2): 424-434 (2014)FEACAN: Front-end acceleration for content-aware network processing., , , , , , and . INFOCOM, page 2114-2122. IEEE, (2011)A Hybrid Model for Ride-hailing Service Demand Forecasting., , , and . CCIOT, page 40-47. ACM, (2019)Network caching for Chip Multiprocessors., , , and . IPCCC, page 341-348. IEEE Computer Society, (2009)Scalable Proximity-Aware Cache Replication in Chip Multiprocessors., , , , and . PACT, page 191-192. IEEE Computer Society, (2011)Data Access Type Aware Replacement Policy for Cache Clustering Organization of Chip Multiprocessors., , , , and . APPT, volume 8299 of Lecture Notes in Computer Science, page 254-268. Springer, (2013)DFC: Towards Effective Feedback Flow Management for Datacenters., , , , and . GCC, page 98-103. IEEE Computer Society, (2010)Optimizing multi-thread string matching for network processor based intrusion management system., , and . Communication, Network, and Information Security, page 199-204. IASTED/ACTA Press, (2006)ActivityHijacker: Hijacking the Android Activity Component for Sensitive Data., , , , and . ICCCN, page 1-9. IEEE, (2016)DroidChain: A novel malware detection method for Android based on behavior chain., , , and . CNS, page 727-728. IEEE, (2015)