From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware., , , и . AsiaCCS, стр. 353-358. ACM, (2013)RoBin: Facilitating the Reproduction of Configuration-Related Vulnerability., , , , и . TrustCom, стр. 91-98. IEEE, (2021)AVMiner: Expansible and Semantic-Preserving Anti-Virus Labels Mining Method., , , , и . TrustCom, стр. 217-224. IEEE, (2022)Efficient and Practical Control Flow Monitoring for Program Security., , , и . ASIAN, том 4435 из Lecture Notes in Computer Science, стр. 90-104. Springer, (2006)Defensor: Lightweight and Efficient Security-Enhanced Framework for Android., , , , и . TrustCom, стр. 260-267. IEEE Computer Society, (2014)Traffic Controller: A Practical Approach to Block Network Covert Timing Channel., , , , и . ARES, стр. 349-354. IEEE Computer Society, (2009)Replacement attacks: automatically evading behavior-based software birthmark., , , , , , и . Int. J. Inf. Sec., 11 (5): 293-304 (2012)Formation Tracking of Second-Order Multi-Agent Systems With Multiple Leaders Based on Sampled Data., , и . IEEE Trans. Circuits Syst. II Express Briefs, 68 (1): 331-335 (2021)Performance-Guaranteed Finite-Time Tracking for Uncertain Strict-Feedback Nonlinear Systems., , , и . IEEE Trans. Circuits Syst. II Express Briefs, 71 (1): 375-379 (января 2024)Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling and Callbacks., , , , и . EAI Endorsed Trans. Security Safety, 4 (11): e2 (2017)