Author of the publication

LeakSemantic: Identifying abnormal sensitive network transmissions in mobile applications.

, , , , and . INFOCOM, page 1-9. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications., , , , , , , and . IEEE Trans. Mob. Comput., 20 (10): 3066-3080 (2021)Enhancing LLM Safety via Constrained Direct Preference Optimization., , and . CoRR, (2024)On the efficiency-vs-security tradeoff in the smart grid., , , and . CDC, page 1954-1959. IEEE, (2012)An Online Algorithm for Power-Proportional Data Centers with Switching Cost., , and . CDC, page 6025-6032. IEEE, (2018)Online multi-resource allocation for deadline sensitive jobs with partial values in the cloud., and . INFOCOM, page 1-9. IEEE, (2016)Trap Coverage: Allowing Coverage Holes of Bounded Diameter in Wireless Sensor Networks., , , and . INFOCOM, page 136-144. IEEE, (2009)Provably delay efficient data retrieving in storage clouds., , , , and . INFOCOM, page 585-593. IEEE, (2015)Networked beamforming in dense mmWave WLANs., , , and . HotMobile, page 102-108. ACM, (2022)Online Learning for Adaptive Probing and Scheduling in Dense WLANs., , and . INFOCOM, page 1-10. IEEE, (2023)Placement and Allocation of Virtual Network Functions: Multi-Dimensional Case., , and . IEEE Trans. Mob. Comput., 22 (7): 4195-4211 (July 2023)