Author of the publication

DyPolDroid: Protecting Users and Organizations from Permission-Abuse Attacks in Android.

, , , , and . SKM, volume 1549 of Communications in Computer and Information Science, page 23-36. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Infrared image-guidance for intraoperative assessment of limb length discrepancy during total hip arthroplasty procedures., , , , , , , , , and 2 other author(s). Medical Imaging: Image-Guided Procedures, volume 11315 of SPIE Proceedings, page 113150D. SPIE, (2020)P2L: Predicting Transfer Learning for Images and Semantic Relations., , , , , , , , and . CoRR, (2019)Active Learning with Data Distribution Shift Detection for Updating Localization Systems., , , and . IPIN, page 1-8. IEEE, (2021)Improving Transferability of Deep Neural Networks., , , and . CoRR, (2018)Graphical processing unit-based machine vision system for simultaneous measurement of shrinkage and soil release in fabrics., , , , , and . J. Electronic Imaging, 19 (2): 023009 (2010)DeepConcolic: testing and debugging deep neural networks., , , , , and . ICSE (Companion Volume), page 111-114. IEEE / ACM, (2019)DyPolDroid: Protecting Against Permission-Abuse Attacks in Android., , , , , , and . Inf. Syst. Frontiers, 25 (2): 529-548 (April 2023)Improving Transferability of Deep Neural Networks., , , and . Domain Adaptation for Visual Understanding, Springer, (2020)DyPolDroid: Protecting Users and Organizations from Permission-Abuse Attacks in Android., , , , and . SKM, volume 1549 of Communications in Computer and Information Science, page 23-36. Springer, (2021)"Boxing Clever": Practical Techniques for Gaining Insights into Training Data and Monitoring Distribution Shift., and . SAFECOMP Workshops, volume 11094 of Lecture Notes in Computer Science, page 393-405. Springer, (2018)