Author of the publication

Automatic privacy leakage detection for massive android apps via a novel hybrid approach.

, , , and . ICC, page 1-7. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Strategic Technology Planning Framework: A Case of Taiwan's Semiconductor Foundry Industry., , and . IEEE Trans. Engineering Management, 56 (1): 4-15 (2009)Towards Efficient Implementation of Lattice-Based Public-Key Encryption on Modern CPUs., , and . TrustCom/BigDataSE/ISPA (1), page 1230-1236. IEEE, (2015)Safe and Sample-Efficient Reinforcement Learning for Clustered Dynamic Environments., and . IEEE Control. Syst. Lett., (2022)Slim and Efficient Neural Network Design for Resource-Constrained SAR Target Recognition., , , , and . Remote. Sens., 10 (10): 1618 (2018)Artificial Intelligence for Complex Network: Potential, Methodology and Application., , , , , , , , , and 1 other author(s). CoRR, (2024)A Fully-Pipeline Linear Systolic Architecture for Modular Multiplier in Public-Key Crypto-Systems., , , and . VLSI Signal Processing, 33 (1-2): 191-197 (2003)SGL: Symbolic Goal Learning in a Hybrid, Modular Framework for Human Instruction Following., , , and . CoRR, (2022)UniSec: a unified security framework with SmartNIC acceleration in public cloud., , , , , , and . ACM TUR-C, page 9:1-9:6. ACM, (2019)Scan array solution for testing power and testing time., , and . ITC, page 652-659. IEEE Computer Society, (2001)Zodiac: System architecture implementation for a high-performance Network Security Processor., , and . ASAP, page 91-96. IEEE Computer Society, (2008)