Author of the publication

Exploiting Dynamic Scheduling for VM-Based Code Obfuscation.

, , , , , , , , and . Trustcom/BigDataSE/ISPA, page 489-496. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A survival condition model of earthen sites based on the danger theory., , , , , , and . ICNC, page 354-362. IEEE, (2015)Content caching with virtual spatial locality in Cellular Network., , , , , , , and . Pervasive Mob. Comput., (2017)Prioritizing the Data in the Target-Tracking Wireless Sensor Networks., , , , , , and . GreenCom/iThings/CPScom, page 1910-1915. IEEE, (2013)Poster: HALL: High-accuracy and Low-cost RFID Localization in Large-scale environment., , , and . MobiSys (Companion Volume), page 17. ACM, (2016)Evaluating Brush Movements for Chinese Calligraphy: A Computer Vision Based Approach., , , , , , , , and . IJCAI, page 1050-1056. ijcai.org, (2018)DeepAid: A Mobile Cognitive Aid System with Compacted Deep Learning., , , , , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 873-880. IEEE, (2018)Semantics-aware obfuscation scheme prediction for binary., , , , , , and . Comput. Secur., (2020)Eliminating Design Effort: A Reconfigurable Sensing Framework For Chipless, Backscatter Tags., , , , , , and . IPSN, page 310-322. IEEE, (2022)Earthen site protection using wireless sensor networks., , , , , and . SenSys, page 339-340. ACM, (2011)Exploring commodity RFID for contactless sub-millimeter vibration sensing., , , and . SenSys, page 15-27. ACM, (2020)