Author of the publication

A Light-Weight Software Environment for Confining Android Malware.

, , , , and . SERE (Companion), page 158-167. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiple Feature Vectors Based Fault Classification for WSN Integrated Bearing of Rolling Mill., , , and . J. Control. Sci. Eng., (2018)HypernasalityNet: Deep recurrent neural network for automatic hypernasality detection., , , , , and . Int. J. Medical Informatics, (2019)Automatic Hypernasality Detection in Cleft Palate Speech Using CNN., , , , , and . Circuits Syst. Signal Process., 38 (8): 3521-3547 (2019)Codee: A Tensor Embedding Scheme for Binary Code Search., , , , and . IEEE Trans. Software Eng., 48 (7): 2224-2244 (2022)SeqTrans: Automatic Vulnerability Fix Via Sequence to Sequence Learning., , , , and . IEEE Trans. Software Eng., 49 (2): 564-585 (February 2023)Automatic detection of pharyngeal fricatives in cleft palate speech using acoustic features based on the vocal tract area spectrum., , , and . Comput. Speech Lang., (2021)Leveraging developer information for efficient effort-aware bug prediction., , and . Inf. Softw. Technol., (2021)On the Trustworthiness of Memory Analysis - An Empirical Study from the Perspective of Binary Execution., , , and . IEEE Trans. Dependable Secur. Comput., 12 (5): 557-570 (2015)Neural Network Fragile watermarking With No Model Performance Degradation., , and . ICIP, page 3958-3962. IEEE, (2022)An effective defense against email spam laundering., , and . CCS, page 179-190. ACM, (2006)