Author of the publication

Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications.

, , , , , , , and . IEEE Trans. Mob. Comput., 20 (10): 3066-3080 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Uncovering Privacy Leakage in BLE Network Traffic of Wearable Fitness Trackers., , , and . HotMobile, page 99-104. ACM, (2016)A hierarchical, modal approach to hybrid systems control of autonomous robots., , , and . IROS, page 1020-1025. IEEE, (2000)A Framework and Architecture for Multirobot Coordination., , , , , , , , , and 4 other author(s). ISER, volume 271 of Lecture Notes in Control and Information Sciences, page 303-312. Springer, (2000)Contextual localization through network traffic analysis., , , and . INFOCOM, page 925-933. IEEE, (2014)Energy Expenditure Estimation using Smartphone Body Sensors., , , , , , , and . BODYNETS, page 8-14. ICST, (2013)AnonAD: Privacy-Aware Micro-Targeted Mobile Advertisements without Proxies., , , , and . ICCCN, page 1-8. IEEE, (2015)Characterization of Wireless Multidevice Users., , , and . ACM Trans. Internet Techn., 16 (4): 29:1-29:25 (2016)Ad hoc networks for localization and control., , , and . CDC, page 2978-2983. IEEE, (2002)Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications., , , , , , , and . IEEE Trans. Mob. Comput., 20 (10): 3066-3080 (2021)Formation control with configuration space constraints., , , and . IROS, page 2755-2760. IEEE, (2003)