Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A beyond multiple robust approach for missing response problem., , and . Comput. Stat. Data Anal., (2021)Out-of-distribution Generalization with Causal Invariant Transformations., , , and . CVPR, page 375-385. IEEE, (2022)MuTent: Dynamic Android Intent Protection with Ownership-Based Key Distribution and Security Contracts., , , , , , and . HICSS, page 1-10. ScholarSpace, (2021)Research on Travel Paths Based on Car-Hailing Services Connecting with Rail Transit., , and . ITSC, page 1686-1691. IEEE, (2023)CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing., , , , , , , , , and 3 other author(s). SP, page 1109-1124. IEEE, (2021)Mobilegt: A system to collect mobile traffic trace and build the ground truth., and . ITNAC, page 142-144. IEEE Computer Society, (2016)Spatiotemporal distribution of human trafficking in China and predicting the locations of missing persons., , , , , , and . Comput. Environ. Urban Syst., (2021)Targeted Privacy Attacks by Fingerprinting Mobile Apps in LTE Radio Layer., , , , , , and . DSN, page 261-273. IEEE, (2023)Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance., , , , , , and . CCS, page 347-362. ACM, (2017)RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections., , , , , , , and . CCS, page 3093-3107. ACM, (2023)