Author of the publication

Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures.

, , , , , , and . CODASPY, page 89-100. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures., , , , , , and . CODASPY, page 89-100. ACM, (2021)Application Value of Artificial Intelligence System in Music Education.. ICISCAE (ACM), page 1459-1462. ACM, (2021)Enterprise Accounting and Financial Risk Analysis System Based on Decision Tree and SVM., , and . ICISCAE (ACM), page 2015-2018. ACM, (2021)Building Extraction Using Mask Scoring R-CNN Network., and . CSAE, page 113:1-113:5. ACM, (2019)Design and Characterization of Arbitrary Filters with an Integrated Spiral Si3N4/SiO2 Waveguide., , , , , and . OFC, page 1-3. IEEE, (2020)Lower bound on the ergodic capacity of distributed MIMO systems over K fading channels., , , and . ICCC, page 1-6. IEEE, (2016)Shallow Attention Network for Polyp Segmentation., , , , , and . MICCAI (1), volume 12901 of Lecture Notes in Computer Science, page 699-708. Springer, (2021)WeakPolyp: You only Look Bounding Box for Polyp Segmentation., , , , and . MICCAI (3), volume 14222 of Lecture Notes in Computer Science, page 757-766. Springer, (2023)Towards Inference of Original Graph Data Information from Graph Embeddings., , , , and . IJCNN, page 1-10. IEEE, (2023)IMS is Not That Secure on Your 5G/4G Phones., , , , , , , , and . MobiCom, page 513-527. ACM, (2024)