Author of the publication

Understanding Application-Battery Interactions on Smartphones: A Large-Scale Empirical Study.

, , and . IEEE Access, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ReSPlay: Improving Cross-Platform Record-and-Replay with GUI Sequence Matching., , , , , , , and . ISSRE, page 439-450. IEEE, (2023)Towards an operating system for the campus., , and . Internetware, page 24:1-24:4. ACM, (2013)Learning Deformable Hypothesis Sampling for Accurate PatchMatch Multi-View Stereo., , , and . AAAI, page 3082-3090. AAAI Press, (2024)What did you pack in my app? a systematic analysis of commercial Android packers., , , , , , , and . ESEC/SIGSOFT FSE, page 1430-1440. ACM, (2022)Coupled Real-Synthetic Domain Adaptation for Real-World Deep Depth Enhancement., , , and . IEEE Trans. Image Process., (2020)Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications., , , , , , and . IEEE Trans. Dependable Secur. Comput., 18 (3): 1033-1050 (2021)WuKong: a scalable and accurate two-phase approach to Android app clone detection., , , and . ISSTA, page 71-82. ACM, (2015)A Novel Lower Limb Rehabilitation Exoskeleton Combined with Wheelchair., , , , , , , , , and . ICIRA (2), volume 14268 of Lecture Notes in Computer Science, page 461-474. Springer, (2023)Automated Extraction of Personal Knowledge from Smartphone Push Notifications., , , , , and . IEEE BigData, page 733-742. IEEE, (2018)FedSlice: Protecting Federated Learning Models from Malicious Participants with Model Slicing., , , , , , and . ICSE, page 460-472. IEEE, (2023)