Author of the publication

An effective access control scheme for preventing permission leak in Android.

, , and . ICNC, page 57-61. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

No Way to Evade: Detecting Multi-Path Routing Attacks for NIDS., , , and . GLOBECOM, page 1-6. IEEE, (2019)A secure domain name resolution and management architecture based on blockchain., , , , , and . ISCC, page 1-7. IEEE, (2020)Exploring Web Partition in DHT-Based Distributed Web Crawling., , , and . IEICE Trans. Inf. Syst., 93-D (11): 2907-2921 (2010)A Measurement Study on the Topologies of BitTorrent Networks., , , , and . IEEE J. Sel. Areas Commun., 31 (9-Supplement): 338-347 (2013)SNGR: Scalable Name-Based Geometric Routing for ICN., , , and . IEICE Trans. Commun., 99-B (8): 1835-1845 (2016)A Privacy-aware Virtual Machine Migration Framework on Hybrid Clouds., , , , and . J. Networks, 9 (5): 1086-1095 (2014)A competitive model of popularity prediction using correlation matrix., , , and . Clust. Comput., 22 (Supplement): 2747-2759 (2019)Overlapping community detection by constrained personalized PageRank., , and . Expert Syst. Appl., (2021)Measuring bandwidth and buffer occupancy to improve the QoE of HTTP adaptive streaming., , , , and . Signal Image Video Process., 13 (7): 1367-1375 (2019)Negative selection algorithm with constant detectors for anomaly detection., , and . Appl. Soft Comput., (2015)