Author of the publication

A Privacy Protection Approach Based on Android Application's Runtime Behavior Monitor and Control.

, , , , , and . Int. J. Digit. Crime Forensics, 10 (3): 95-113 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Low-complexity companding function design for PAPR reduction in OFDM systems., , and . IET Commun., 14 (10): 1581-1587 (2020)A simplified parametric channel estimation scheme for OFDM systems., , , and . IEEE Trans. Wirel. Commun., 7 (12-1): 5082-5090 (2008)SFCSim: a network function virtualization resource allocation simulation platform., , and . Clust. Comput., 26 (1): 423-436 (February 2023)Decode-and-Forward Full-Duplex Relay Selection Under Rayleigh Fading Environment., , , , , , , , and . WICON, volume 214 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 121-130. Springer, (2016)Low Energy Clustering in BAN Based on Fuzzy Simulated Evolutionary Computation., , , , and . BODYNETS, ICST, (2015)Antenna Performance Over-the-Air Testing of 5G Commercial Smartphones., , , and . IEEE Trans. Instrum. Meas., (2024)Analysis of mobile WiMAX security: Vulnerabilities and solutions., , , , and . MASS, page 828-833. IEEE Computer Society, (2008)A Proxy Based Information Integration System for Distributed Wireless Sensor Networks., , and . CDVE, volume 4674 of Lecture Notes in Computer Science, page 340-342. Springer, (2007)EVD-Based Detection for Multi-Cell Massive MIMO Network., , , and . VTC Fall, page 1-4. IEEE, (2015)A Novel Optimal Recursive MMSE-SIC Detection Algorithm for V-BLAST Systems., , , and . ICC, page 3105-3110. IEEE, (2006)