Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Static Analysis of Superfluous Network Transmissions in Android Applications., , , , and . Int. J. Netw. Secur., 22 (3): 409-418 (2020)Identifying compatibility-related APIs by exploring biased distribution in Android apps., , , , , , and . ICSE (Companion Volume), page 280-281. ACM, (2020)AppPoet: Large Language Model based Android malware detection via multi-view prompt engineering., , and . CoRR, (2024)High Performance Computing and Real Time Software for High Dimensional Data Classification.. University of California, Los Angeles, USA, (2018)base-search.net (ftcdlib:qt0gd0x6q2).Limiting Privacy Breaches in Average-Distance Query., , , , and . Secur. Commun. Networks, (2020)AppAngio: Revealing Contextual Information of Android App Behaviors by API-Level Audit Logs., , , , and . IEEE Trans. Inf. Forensics Secur., (2021)IOT Cloud Teaching Platform Design., and . ICDEL, page 66-71. ACM, (2023)A Privacy Enforcement Framework for Android Systems Using Symbolic Execution-Based Instrumentation., , , and . BigCom, page 108-113. IEEE Computer Society, (2018)Identifying Superfluous Network Transmissions in Android Applications., , , , and . BigCom, page 96-101. IEEE Computer Society, (2018)Divide and Conquer: Recovering Contextual Information of Behaviors in Android Apps around Limited-quantity Audit Logs., , , , , and . CoRR, (2018)