Author of the publication

TKPERM: Cross-platform Permission Knowledge Transfer to Detect Overprivileged Third-party Applications.

, , , , and . NDSS, The Internet Society, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Exploratory Study of Functionality and Learning Resources of Web APIs on ProgrammableWeb., , and . EASE, page 202-207. ACM, (2017)A purpose-based privacy-aware system using privacy data graph., , and . MoMM, page 412-416. ACM, (2009)Hardware/Software Security Patches for Internet of Trillions of Things., , , and . CoRR, (2019)UnLocIn: Unauthorized location inference on smartphones without being caught., , , , , , , and . PRISMS, page 1-8. IEEE, (2013)The Influence of Different Personality Traits on Learning Achievement in Three Learning Situations., , , and . ICBL, volume 10309 of Lecture Notes in Computer Science, page 475-488. Springer, (2017)Using a coordination degree model to evaluate intensive urban land utilization., , , , , and . Geoinformatics, page 1-5. IEEE, (2010)A framework for distributed metadata management of mineral information resources with access control., , , and . Geoinformatics, page 1-4. IEEE, (2013)Secure multi-owner-based cloud computing scheme for big data., , and . Int. J. Big Data Intell., 3 (3): 182-189 (2016)Design of Rapid Image Mosaic Based on CUDA by 100-Megapixel Optical System., , , , , , and . CSAE, page 123:1-123:6. ACM, (2020)Theoretical approach to modelling and analysis of the bioprocess with product inhibition and impulse effect., , , and . Biosyst., 104 (2-3): 77-86 (2011)