Author of the publication

An Android Vulnerability Detection System.

, , , , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 169-183. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Some classes of monomial complete permutation polynomials over finite fields of characteristic two., , , and . Finite Fields Their Appl., (2014)Research on Security Assessment of Cross Border Data Flow., , , , and . FCS, volume 1558 of Communications in Computer and Information Science, page 327-341. Springer, (2021)Several classes of optimal p-ary cyclic codes with minimum distance four., , and . Finite Fields Their Appl., (December 2023)Detecting Inconsistent Vulnerable Software Version in Security Vulnerability Reports., , , , , , , , and . FCS, volume 1558 of Communications in Computer and Information Science, page 78-99. Springer, (2021)Construction of Near-Complementary Sequences with Low PMEPR for Peak Power Control in OFDM., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 95-A (11): 1881-1887 (2012)Several Classes of Permutation Trinomials over F5sn From Niho Exponents., and . CoRR, (2017)New near-complementary sequences with low PMEPR for peak power control in OFDM., and . IWSDA, page 96-99. IEEE, (2011)Cross-Border Data Security from the Perspective of Risk Assessment., , , , , , and . ISPEC, volume 14341 of Lecture Notes in Computer Science, page 91-104. Springer, (2023)An Approach for Predicting the Popularity of Online Security News Articles., , , and . CNS, page 1-6. IEEE, (2018)Construction of near-complementary sequences of length n · 2m., and . IWSDA, page 19-23. IEEE, (2015)