Author of the publication

Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services.

, , , , , and . ACSAC, page 320-331. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TSadv: Black-box adversarial attack on time series with local perturbations., , , and . Eng. Appl. Artif. Intell., (2022)Implementation of MIMO-SAR Imaging Based on Jamming Signal., , , , and . IEEE Geosci. Remote. Sens. Lett., (2023)BRR-CVR: A Collaborative Caching Strategy for Information-Centric Wireless Sensor Networks., , , , and . MSN, page 31-38. IEEE Computer Society, (2016)AI-Assisted Analysis to HIV Lateral Flow Test with a Hybrid Model Running on a Distributed Diagnosis System., , , , , , , , , and 2 other author(s). CISP-BMEI, page 1-6. IEEE, (2022)An adaptive optimization method for estimating the number of components in a Gaussian mixture model., , , , , , , , and . J. Comput. Sci., (2022)Security analysis of third-party in-app payment in mobile applications., , , and . J. Inf. Secur. Appl., (2019)A Situation of Economic Management in NTU Cooperative Fuzzy Games., and . WHICEB, page 1. Association for Information Systems, (2013)Dynamic early warning system of College Students' target course performance based on improved Apriori algorithm., , , and . J. Comput. Methods Sci. Eng., 21 (6): 1779-1795 (2021)GlobeSen: an open interconnection framework based on named sensory date for IoT., , , and . ACM TUR-C, page 43:1-43:10. ACM, (2017)A Novel Transformer-Based Model for Dialog State Tracking., , , and . HCI (12), volume 13313 of Lecture Notes in Computer Science, page 148-156. Springer, (2022)