Author of the publication

Andromeda: Accurate and Scalable Security Analysis of Web Applications.

, , , , and . FASE, volume 7793 of Lecture Notes in Computer Science, page 210-225. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parallelization of Classical Numerical optimization in Quantum Variational Algorithms., , , , and . ICST, page 309-320. IEEE, (2020)UI X-Ray: Interactive Mobile UI Testing Based on Computer Vision., , , , , and . IUI, page 245-255. ACM, (2017)More Is Less: Learning Efficient Video Representations by Big-Little Network and Depthwise Temporal Aggregation., , , , and . NeurIPS, page 2261-2270. (2019)Dynamic detection of inter-application communication vulnerabilities in Android., , and . ISSTA, page 118-128. ACM, (2015)Static Specification Mining Using Automata-Based Abstractions., , , and . IEEE Trans. Software Eng., 34 (5): 651-666 (2008)A framework for automatic anomaly detection in mobile applications., , , and . MOBILESoft, page 297-298. ACM, (2016)Improving design validation of mobile application user interface implementation., , , and . MOBILESoft, page 277-278. ACM, (2016)TAJ: effective taint analysis of web applications., , , , and . PLDI, page 87-97. ACM, (2009)Absolute Variation Distance: An Inversion Attack Evaluation Metric for Federated Learning., , , and . ECIR (4), volume 14611 of Lecture Notes in Computer Science, page 243-256. Springer, (2024)Ranking Distance Metric for Privacy Budget in Distributed Learning of Finite Embedding Data., , , and . ECIR (4), volume 14611 of Lecture Notes in Computer Science, page 257-269. Springer, (2024)