Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep Phenotyping of Non-Alcoholic Fatty Liver Disease Patients with Genetic Factors for Insights into the Complex Disease., , , , , , , and . CoRR, (2023)Identifying Mobile Inter-App Communication Risks., , , , and . IEEE Trans. Mob. Comput., 19 (1): 90-102 (2020)Industrial Strength Static Detection for Cryptographic API Misuses., , , , , and . SecDev, page 61-62. IEEE, (2022)Data-Driven Vulnerability Detection and Repair in Java Code., , , , and . CoRR, (2021)Towards automatic privacy management in Web 2.0 with semantic analysis on annotations., , , and . CollaborateCom, page 1-10. ICST / IEEE, (2009)OMOS: A Framework for Secure Communication in Mashup Applications., , and . ACSAC, page 355-364. IEEE Computer Society, (2008)A semantics aware approach to automated reverse engineering unknown protocols., , , , , , , , and . ICNP, page 1-10. IEEE Computer Society, (2012)Program Analysis of Cryptographic Implementations for Security., and . SecDev, page 61-68. IEEE Computer Society, (2017)A Sharper Sense of Self: Probabilistic Reasoning of Program Behaviors for Anomaly Detection with Context Sensitivity., , , and . DSN, page 467-478. IEEE Computer Society, (2016)DECT: Distributed Evolving Context Tree for Mining Web Behavior Evolution., , and . EDBT, page 573-579. OpenProceedings.org, (2016)