Author of the publication

App in the Middle: Demystify Application Virtualization in Android and its Security Threats.

, , , , , , , and . SIGMETRICS (Abstracts), page 75-76. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Online Multi-object Tracking by Maximum a Posteriori Estimation with Sequential Trajectory Prior., , , and . ICONIP (1), volume 9489 of Lecture Notes in Computer Science, page 623-633. Springer, (2015)A Novel Top-N Recommendation Approach Based on Conditional Variational Auto-Encoder., , and . PAKDD (2), volume 11440 of Lecture Notes in Computer Science, page 357-368. Springer, (2019)Estimating the Fundamental Matrix Using Second-Order Cone Programming.. AICI (3), volume 7004 of Lecture Notes in Computer Science, page 581-586. Springer, (2011)Cross-Domain Sentiment Classification by Capsule Network With Semantic Rules., , , , and . IEEE Access, (2018)A survey of privacy protection techniques for mobile devices., , , , and . J. Comm. Inform. Networks, 1 (4): 86-92 (2016)Parallel ILU preconditioners in GPU computation., , , , , , , , and . Soft Comput., 22 (24): 8187-8205 (2018)A coordinated control strategy of SMES based on common DC bus., , , , , and . IECON, page 5430-5435. IEEE, (2014)Leveraging Long and Short-term Information in Content-aware Movie Recommendation., , , , , , and . CoRR, (2017)polynomial selection for the number field sieve in geometric view., , , , and . IACR Cryptology ePrint Archive, (2013)Evolutionary Design of Trace Form Bent Functions., , and . IACR Cryptology ePrint Archive, (2005)