Author of the publication

Demystifying Hidden Privacy Settings in Mobile Apps.

, , , , , , , , , , , and . IEEE Symposium on Security and Privacy, page 570-586. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A concept acquisition method based on visual perception., and . MFI, page 1-8. IEEE, (2014)Improved Layered Space Time Architecture Through Unequal Power Allocation and Multistage Decoding., and . CCECE, page 932-935. IEEE, (2006)Understanding Membership Inferences on Well-Generalized Learning Models., , , , , , , and . CoRR, (2018)Agile Practices in Use from an Innovation Assimilation Perspective: A Multiple Case Study., , and . ICIS, page 7. Association for Information Systems, (2007)An Architecture Description Language Based on Dynamic Description Logics., , , , , , and . Intelligent Information Processing, volume 385 of IFIP Advances in Information and Communication Technology, page 157-166. Springer, (2012)Radar Signal Recognition Based on Deep Feature Fusion of Multiple Time-frequency Images., , , , , and . WCSP, page 377-383. IEEE, (2023)Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android., , , , , , , , , and . RAID, page 261-275. USENIX Association, (2019)Towards Imbalanced Large Scale Multi-label Classification with Partially Annotated Labels., , , , and . SERA, page 195-200. IEEE, (2023)Classification of Fabric Patterns Image Based on Improved Log-AlexNet., , and . CISP-BMEI, page 1-6. IEEE, (2018)Removing Key Escrow from the LW-HIBE Scheme., , , , and . ICA3PP (Workshops and Symposiums), volume 9532 of Lecture Notes in Computer Science, page 593-605. Springer, (2015)