Author of the publication

Detecting third-party libraries in Android applications with high precision and recall.

, , , , , , and . SANER, page 141-152. IEEE Computer Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic measurement of rotation center for laminography scanning system without dedicated phantoms., , , , , and . J. Electronic Imaging, 23 (5): 053018 (2014)Parallel ILU preconditioners in GPU computation., , , , , , , , and . Soft Comput., 22 (24): 8187-8205 (2018)A survey of privacy protection techniques for mobile devices., , , , and . J. Comm. Inform. Networks, 1 (4): 86-92 (2016)Mechanical and environmental durability of roll-to-roll printed silver nanoparticle film using a rapid laser annealing process for flexible electronics., , , , , , , and . Microelectron. Reliab., 54 (12): 2871-2880 (2014)Corrigendum to Ä New User Behavior Evaluation Method in Online Social Network" Journal of Information Security and Applications Volume 48 (2019) 102371., , , and . J. Inf. Secur. Appl., (2020)A novel algorithm enumerating Bent functions., , , and . IACR Cryptology ePrint Archive, (2004)Analysis of Affinely Equivalent Boolean Functions., , , and . IACR Cryptology ePrint Archive, (2005)Evolutionary Design of Trace Form Bent Functions., , and . IACR Cryptology ePrint Archive, (2005)polynomial selection for the number field sieve in geometric view., , , , and . IACR Cryptology ePrint Archive, (2013)Leveraging Long and Short-term Information in Content-aware Movie Recommendation., , , , , , and . CoRR, (2017)