Author of the publication

TAM: A Transparent Agent Architecture for Measuring Mobile Applications.

, , , , and . Comput. Sci. Eng., 19 (1): 54-61 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Touchscreens Can Reveal User Identity: Capacitive Plethysmogram-Based Biometrics., , , , , , , and . IEEE Trans. Mob. Comput., 23 (1): 895-908 (January 2024)PMUSpill: The Counters in Performance Monitor Unit that Leak SGX-Protected Secrets., , , , , , , , and . CoRR, (2022)VoltJockey: A New Dynamic Voltage Scaling-Based Fault Injection Attack on Intel SGX., , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 40 (6): 1130-1143 (2021)Photoplethysmogram-based Cognitive Load Assessment Using Multi-Feature Fusion Model., , , , , , , and . ACM Trans. Appl. Percept., 16 (4): 19:1-19:17 (2019)DynaComm: Accelerating Distributed CNN Training Between Edges and Clouds Through Dynamic Communication Scheduling., , , , , , and . IEEE J. Sel. Areas Commun., 40 (2): 611-625 (2022)VoltJockey: Breaching TrustZone by Software-Controlled Voltage Manipulation over Multi-core Frequencies., , , and . CCS, page 195-209. ACM, (2019)Optimal Schedule of Mobile Edge Computing Under Imperfect CSI., , , , , and . ICA3PP (2), volume 11335 of Lecture Notes in Computer Science, page 32-45. Springer, (2018)FPGA IP protection by binding Finite State Machine to Physical Unclonable Function., , , , , , , and . FPL, page 1-4. IEEE, (2013)What Makes a Great Mobile App? A Quantitative Study Using a New Mobile Crawler., , , , , and . SOSE, page 222-227. IEEE Computer Society, (2018)UCPR: User Classification and Influence Analysis in Social Network., , , and . ICDCS Workshops, page 311-315. IEEE Computer Society, (2017)