Author of the publication

A Systematical Study on Application Performance Management Libraries for Apps.

, , , , , , , , and . IEEE Trans. Software Eng., 48 (8): 3044-3065 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GranDroid: Graph-Based Detection of Malicious Network Behaviors in Android Applications., , , , and . SecureComm (1), volume 254 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 264-280. Springer, (2018)Rectifying Administrated ERC20 Tokens., , and . ICICS (1), volume 12918 of Lecture Notes in Computer Science, page 22-37. Springer, (2021)Privacy-Preserving Diffusion Model Using Homomorphic Encryption., and . CoRR, (2024)Special issue on advances in security and privacy in IoT., , and . J. Netw. Comput. Appl., (2019)DynamicFL: Balancing Communication Dynamics and Client Manipulation for Federated Learning., , , and . SECON, page 312-320. IEEE, (2023)Achieving 5As in Cloud Centric Cognitive Cellular Networks., , , and . GLOBECOM, page 1-6. IEEE, (2016)Lexical Mining of Malicious URLs for Classifying Android Malware., , , , , , and . SecureComm (1), volume 254 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 248-263. Springer, (2018)High-bandwidth ultrasonic communication using graphene-based acoustic devices., , and . INFOCOM Workshops, page 1-2. IEEE, (2018)Deep and broad URL feature mining for android malware detection., , , , , , and . Inf. Sci., (2020)On the Limitation of Embedding Cryptographic Signature for Primary Transmitter Authentication., , , , and . IEEE Wirel. Commun. Lett., 1 (4): 324-327 (2012)