Author of the publication

SieveDroid: Intercepting Undesirable Private-Data Transmissions in Android Applications.

, , , , and . IEEE Syst. J., 14 (1): 375-386 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Randomized Component and Its Application to (t, m, n)-Group Oriented Secret Sharing., , , and . IEEE Trans. Inf. Forensics Secur., 10 (5): 889-899 (2015)Multilevel threshold secret sharing based on the Chinese Remainder Theorem., and . Inf. Process. Lett., 114 (9): 504-509 (2014)An Automated Analyzer for Financial Security of Ethereum Smart Contracts., , , , , , , and . CoRR, (2022)The Centralized Group Key Management Scheme Based-Chinese Remainder Theorem in Multicast Communication., and . BigCom, page 128-133. IEEE, (2022)A Novel Data Aggregation Scheme for Wireless Sensor Networks Based on Robust Chinese Remainder Theorem., and . MSN, page 121-125. IEEE, (2022)An Improved Data Aggregation Scheme for Wireless Sensor Networks Based on Robust Chinese Remainder Theorem., and . APNet, page 170-171. ACM, (2023)Divide and conquer: recovering contextual information of behaviors in Android apps around limited-quantity audit logs., , , , , and . ICSE (Companion Volume), page 230-231. IEEE / ACM, (2019)Verifiable secret sharing based on the Chinese remainder theorem., , and . Secur. Commun. Networks, 7 (6): 950-957 (2014)Tightly Coupled Secret Sharing and Its Application to Group Authentication., , , , , and . CoRR, (2019)A secure and efficient on-line/off-line group key distribution protocol., , and . Des. Codes Cryptogr., 87 (7): 1601-1620 (2019)