Author of the publication

SPrune: A Code Pruning Tool for Ethereum Solidity Contract Static Analysis.

, , , and . BigCom, page 66-70. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SieveDroid: Intercepting Undesirable Private-Data Transmissions in Android Applications., , , , and . IEEE Syst. J., 14 (1): 375-386 (2020)Accurate Indoor Localization Using Acoustic Direction Finding via Smart Phones., , , , , , and . CoRR, (2013)Limiting Privacy Breaches in Average-Distance Query., , , , and . Secur. Commun. Networks, (2020)AppAngio: Revealing Contextual Information of Android App Behaviors by API-Level Audit Logs., , , , and . IEEE Trans. Inf. Forensics Secur., (2021)Using an SQP Algorithm to Choose the Feature Set for Data Field Clustering., , and . Smart Comput. Rev., 3 (4): 210-219 (2013)"Friend is Treasure": Exploring and Exploiting Mobile Social Contacts for Efficient Task Offloading., , , , , , and . IEEE Trans. Vehicular Technology, 65 (7): 5485-5496 (2016)WalkieLokie: Relative Positioning for Augmented Reality Using a Dummy Acoustic Speaker., , , , , and . CoRR, (2015)Swadloon: Direction Finding and Indoor Localization Using Acoustic Signal by Shaking Smartphones., , , , , , , and . IEEE Trans. Mob. Comput., 14 (10): 2145-2157 (2015)A General Formal Framework of Analyzing Selective Disclosure Attribute-Based Credential Systems., , , , , and . Int. J. Netw. Secur., 19 (5): 794-803 (2017)Detecting Improper Behaviors of Stubbornly Requesting Permissions in Android Applications., , , and . Int. J. Netw. Secur., 22 (3): 381-391 (2020)