Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compositional Information Flow Verification for Inter Application Communications in Android System., , , and . ML4CS, volume 11806 of Lecture Notes in Computer Science, page 239-252. Springer, (2019)Lightweight Security Authentication Mechanism Towards UAV Networks., , , , , , , and . NaNA, page 379-384. IEEE, (2019)Android Malware Detection Based on Call Graph via Graph Neural Network., , , , , and . NaNA, page 368-374. IEEE, (2020)ACDroid: Detecting Collusion Applications on Smart Devices., , , , and . SciSec, volume 14299 of Lecture Notes in Computer Science, page 3-22. Springer, (2023)UBER: Combating Sandbox Evasion via User Behavior Emulators., , , and . ICICS, volume 11999 of Lecture Notes in Computer Science, page 34-50. Springer, (2019)Selecting Critical Data Flows in Android Applications for Abnormal Behavior Detection., , and . Mob. Inf. Syst., (2017)Android Malware Detection via Graph Representation Learning., , , , , and . Mob. Inf. Syst., (2021)PatchDB: A Large-Scale Security Patch Dataset., , , , and . DSN, page 149-160. IEEE, (2021)Data-Oriented Instrumentation against Information Leakages of Android Applications., , , and . COMPSAC (2), page 485-490. IEEE Computer Society, (2017)978-1-5386-0367-3.Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots., , , , , , and . DIMVA, volume 13358 of Lecture Notes in Computer Science, page 197-217. Springer, (2022)