Author of the publication

Ghost Installer in the Shadow: Security Analysis of App Installation on Android.

, , , , , , , , , and . DSN, page 403-414. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust and Consistent Clustering Recovery via SDP Approaches., , and . DSW, page 46-50. IEEE, (2018)Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS., , , , , , , and . ACM Conference on Computer and Communications Security, page 31-43. ACM, (2015)Beyond Black-Box Advice: Learning-Augmented Algorithms for MDPs with Q-Value Predictions., , , and . CoRR, (2023)Self-Organized Dynamic Caching Space Sharing in Virtualized Wireless Networks., , , and . GLOBECOM Workshops, page 1-6. IEEE, (2016)Unauthorized Cross-App Resource Access on MAC OS X and iOS., , , , , , , and . CoRR, (2015)Anytime-Competitive Reinforcement Learning with Policy Prior., , , , and . CoRR, (2023)TENSILE: A Tensor granularity dynamic GPU memory scheduler method towards multiple dynamic workloads system., , , , , and . CoRR, (2021)Disentangling Observed Causal Effects from Latent Confounders using Method of Moments., , , , , and . CoRR, (2021)Data assimilation of rotor flow at hovering state using ensemble Kalman filter., , , and . J. Vis., 26 (4): 815-839 (August 2023)Optimal Bidding of Energy Storage: A Surrogate Method with Combined Spatial-Temporal Entropy., , , , , and . CoRR, (2021)