Author of the publication

AppScalpel: Combining static analysis and outlier detection to identify and prune undesirable usage of sensitive data in Android applications.

, , , , , and . Neurocomputing, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Skill Acquisition and Data Sales., , and . Manag. Sci., 68 (8): 6116-6144 (2022)Fine-Grained Refinement on TPM-Based Protocol Applications., , , , , , and . IEEE Trans. Inf. Forensics Secur., 8 (6): 1013-1026 (2013)SieveDroid: Intercepting Undesirable Private-Data Transmissions in Android Applications., , , , and . IEEE Syst. J., 14 (1): 375-386 (2020)A new method for discovering behavior patterns among animal movements., , , , , , , , , and 1 other author(s). Int. J. Geogr. Inf. Sci., 30 (5): 929-947 (2016)Surrogate modeling for spacecraft thermophysical models using deep learning., , , , , and . Neural Comput. Appl., 34 (19): 16577-16603 (2022)Research on influence mechanism of running clothing fatigue based on BP neural network., , , and . J. Intell. Fuzzy Syst., 40 (4): 7577-7587 (2021)Swadloon: Direction Finding and Indoor Localization Using Acoustic Signal by Shaking Smartphones., , , , , , , and . IEEE Trans. Mob. Comput., 14 (10): 2145-2157 (2015)A General Formal Framework of Analyzing Selective Disclosure Attribute-Based Credential Systems., , , , , and . Int. J. Netw. Secur., 19 (5): 794-803 (2017)Detecting Improper Behaviors of Stubbornly Requesting Permissions in Android Applications., , , and . Int. J. Netw. Secur., 22 (3): 381-391 (2020)Tightly coupled multi-group threshold secret sharing based on Chinese Remainder Theorem., , , and . Discret. Appl. Math., (2019)