Author of the publication

An Android Vulnerability Detection System.

, , , , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 169-183. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NaturalVLM: Leveraging Fine-grained Natural Language for Affordance-Guided Visual Manipulation., , , , and . CoRR, (2024)Sports injury early warning of basketball players based on RBF neural network algorithm., , , and . J. Intell. Fuzzy Syst., 45 (3): 4291-4300 (2023)Overfitting the Data: Compact Neural Video Delivery via Content-aware Feature Modulation., , , , , , , , , and . ICCV, page 4611-4620. IEEE, (2021)Neural Noise Embedding for End-To-End Speech Enhancement with Conditional Layer Normalization., , , , , and . ICASSP, page 7113-7117. IEEE, (2021)Characterizing Erasable Accounts in Ethereum., , , and . ISC, volume 12472 of Lecture Notes in Computer Science, page 352-371. Springer, (2020)Under-optimized smart contracts devour your money., , , and . SANER, page 442-446. IEEE Computer Society, (2017)Multimodal Usability of Human-Computer Interaction Based on Task-Human-Computer-Centered Design., , , and . ICIC (1), volume 10361 of Lecture Notes in Computer Science, page 459-468. Springer, (2017)An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks., , , , , , , and . ISPEC, volume 10701 of Lecture Notes in Computer Science, page 3-24. Springer, (2017)Understanding Ethereum via Graph Analysis., , , , , , , and . INFOCOM, page 1484-1492. IEEE, (2018)GasTrace: Detecting Sandwich Attack Malicious Accounts in Ethereum., , , and . CoRR, (2024)