Author of the publication

Towards Discovering and Understanding Task Hijacking in Android.

, , , , and . USENIX Security Symposium, page 945-959. USENIX Association, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzy Evaluation of Different Irrigation and Fertilization on Growth of Greenhouse Tomato., , , , , , and . ICFIE, volume 40 of Advances in Soft Computing, page 980-987. Springer, (2007)Large Language Models as Visual Cross-Domain Learners., , , , and . CoRR, (2024)A Denoising Framework for Image Caption., , , and . DASC/PiCom/DataCom/CyberSciTech, page 825-832. IEEE, (2019)Optimal frame synchronization for DVB-S2., , , , , and . ISCAS, page 956-959. IEEE, (2008)Diversifying Tire-Defect Image Generation Based on Generative Adversarial Network., , , , , , , and . IEEE Trans. Instrum. Meas., (2022)Adaptive Android Kernel Live Patching., , , , , and . USENIX Security Symposium, page 1253-1270. USENIX Association, (2017)Optimization of Electrostatic Energy Harvesting Device with Multi-Step Structure., , and . NEMS, page 167-172. IEEE, (2018)Damage detection of nonlinear structures using probability density ratio estimation., , , and . Comput. Aided Civ. Infrastructure Eng., 37 (7): 878-893 (2022)A Joint Scheme on Spectrum Sensing and Access with Partial Observation: A Multi-Agent Deep Reinforcement Learning Approach., , , and . ICCC, page 1-6. IEEE, (2023)Morphological Guided Causal Constraint Network for Medical Image Multi-Object Segmentation., , , , , , , , and . BIBM, page 516-521. IEEE, (2023)