Author of the publication

Invetter: Locating Insecure Input Validations in Android Services.

, , , , , , , and . ACM Conference on Computer and Communications Security, page 1165-1178. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Model and Integrate Medical Resource Available Times and Relationships in Verifiably Correct Executable Medical Best Practice Guideline Models (Extended Version)., , , , and . CoRR, (2018)Design Verifiably Correct Model Patterns to Facilitate Modeling Medical Best Practice Guidelines with Statecharts (Technical Report)., , , , and . CoRR, (2018)A development of modal expansion method for eigensensitivity analysis of a defective matrix.. Appl. Math. Comput., 188 (2): 1995-2019 (2007)Effective estimation of the desired-signal subspace and its application to robust adaptive beamforming., , , , and . ICASSP, page 3370-3374. IEEE, (2017)A Subsumption Hierarchy of Test Case Prioritization for Composite Services., , , , , , and . IEEE Trans. Serv. Comput., 8 (5): 658-673 (2015)Novel 16-QAM Golay Complementary Sequences., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 97-A (7): 1631-1634 (2014)National scale spatiotemporal land-use regression model for PM2.5, PM10 and NO2 concentration in China, , , , , , , , , and . Atmospheric Environment, (2018)Accuracy Graphs of Spectrum-Based Fault Localization Formulas., , , and . IEEE Trans. Reliability, 66 (2): 403-424 (2017)Uniform genomic data analysis in the NCI Genomic Data Commons, , , , , , , , , and . Nature Communications, 12 (1): 1--11 (February 2021)DRG2vec: Learning Word Representations from Definition Relational Graph., , , and . IJCNN, page 1-9. IEEE, (2020)