Author of the publication

Demystifying Hidden Privacy Settings in Mobile Apps.

, , , , , , , , , , , and . IEEE Symposium on Security and Privacy, page 570-586. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust-Aware and Low Energy Consumption Security Topology Protocol of Wireless Sensor Network., , , and . J. Sensors, (2015)Improved Successive Cancellation Decoding of Polar Codes., , and . IEEE Trans. Commun., 61 (8): 3100-3107 (2013)Dynamic queuing sharing mechanism for per-flow quality of service control., , , and . IET Commun., 4 (4): 472-483 (2010)Practical polar code construction over parallel channels., , and . IET Commun., 7 (7): 620-627 (2013)HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks., , , , , , and . CoRR, (2021)SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems., , , , , , and . CoRR, (2021)HAFLO: GPU-Based Acceleration for Federated Logistic Regression., , , , and . CoRR, (2021)Exploring the Generalizability of Spatio-Temporal Traffic Prediction: Meta-Modeling and an Analytic Framework., , , , and . IEEE Trans. Knowl. Data Eng., 35 (4): 3870-3884 (April 2023)Safer-Instruct: Aligning Language Models with Automated Preference Data., , and . CoRR, (2023)A Survey for Federated Learning Evaluations: Goals and Measures., , , , , and . CoRR, (2023)