Author of the publication

An empirical assessment of security risks of global Android banking apps.

, , , , , , , and . ICSE, page 1310-1322. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Challenging Machine Learning-Based Clone Detectors via Semantic-Preserving Code Transformations., , , , , and . IEEE Trans. Software Eng., 49 (5): 3052-3070 (2023)Erratum to Äccurate and Scalable Cross-Architecture Cross-OS Binary Code Search With Emulation"., , , and . IEEE Trans. Software Eng., 47 (5): 1088 (2021)Mystique: Evolving Android Malware for Auditing Anti-Malware Tools., , , , , , and . AsiaCCS, page 365-376. ACM, (2016)From Collision to Verdict: Responsibility Attribution for Autonomous Driving Systems Testing., , , , and . ISSRE, page 321-332. IEEE, (2023)Prediction of Vulnerability Characteristics Based on Vulnerability Description and Prompt Learning., , , , and . SANER, page 604-615. IEEE, (2023)Comparison and Evaluation of Clone Detection Techniques with Different Code Representations., , , , , and . ICSE, page 332-344. IEEE, (2023)CloneDifferentiator: Analyzing clones by differentiation., , and . ASE, page 576-579. IEEE Computer Society, (2011)Avoiding Some Common Preprocessing Pitfalls with Feature Queries., , , and . APSEC, page 283-290. IEEE Computer Society, (2009)Securing Android App Markets via Modeling and Predicting Malware Spread Between Markets., , , , and . IEEE Trans. Inf. Forensics Secur., 14 (7): 1944-1959 (2019)Improving Product Line Architecture Design and Customization by Raising the Level of Variability Modeling., , , , , and . ICSR, volume 6727 of Lecture Notes in Computer Science, page 151-166. Springer, (2011)